7 Hits in 9.7 sec

Developing Secure Services for IoT with OP-TEE: A First Look at Performance and Usability [article]

Christian Göttel, Pascal Felber, Valerio Schiavoni
2019 arXiv   pre-print
In this short paper we show how one can leverage OP-TEE for implementing a secure service (i.e., a key-value store).  ...  OP-TEE is a free-software framework to implement trusted applications and services for TrustZone.  ...  The research leading to these results has received funding from the European Union's Horizon 2020 research and innovation programme under the LEGaTO Project (, grant agreement No 780681  ... 
arXiv:1904.11545v1 fatcat:3xztxkr7ovarlkoghzbhscwlam

Rootkit Detection on Embedded IoT Devices

Roland Nagy, Krisztián Németh, Dorottya Papp, Levente Buttyán
2021 Acta Cybernetica  
rootkits that we developed for this purpose.  ...  In this paper, we address this challenge: we propose a rootkit detection approach for embedded IoT devices that takes advantage of a trusted execution environment (TEE), which is often supported on popular  ...  At the same time, IoT also comes with a number of risks related to information security.  ... 
doi:10.14232/actacyb.288834 fatcat:bsagk4jy6fh6hbelpmx2mfduhm

Dominance as a New Trusted Computing Primitive for the Internet of Things

Meng Xu, Manuel Huber, Zhichuang Sun, Paul England, Marcus Peinado, Sangho Lee, Andrey Marochko, Dennis Mattoon, Rob Spiger, Stefan Thom
2019 2019 IEEE Symposium on Security and Privacy (SP)  
This is especially true for large-scale IoT deployments in which a central entity deploys and controls a large number of IoT devices with minimal human interaction.  ...  At the same time, recovery from root compromise by conventional means becomes costly and slow, even more so if the devices are dispersed over a large geographical area.  ...  ACKNOWLEDGMENTS We would like to thank Jordan Rhee for his generous help. We also thank the reviewers for their helpful feedback.  ... 
doi:10.1109/sp.2019.00084 dblp:conf/sp/XuHSEP0MMST19 fatcat:dduiib7tgfhhbizqxc7uua4shy

On Hardware-based security in embedded systems : evaluating potential use of secure hardware in C-ITS stations

Gerhard Hechenberger, Edgar Weippl
In our work to improve security in the next generation of C-ITS stations, we first analyze for system and service requirements based on IEC 62443 and conduct a Threat and Risk Analysis (TRA).  ...  However, as expected due to the usage of a Trusted Execution Environment (TEE), encryption performance suffered from a drop of factor 30 for small files to a drop of about factor 2.4 for big files in a  ...  The approved original version of this thesis is available in print at TU Wien Bibliothek. List of Tables  ... 
doi:10.34726/hss.2020.67806 fatcat:etgbpp74brctlo2jfljbygwoau

5GZORRO_D2.2: Design of the 5GZORRO Platform for Security & Trust

. Carrozzo, P.G. Giardina, J. Brenes, E. Bucchianeri, G. Landi, C. Herranz, A. Fernandez, M. S. Siddiqui, Javier Fernandez, K. Meth, K. Barabash, Diego R. López, P. Diogo, L. Conceicao, T. Subramanya, R. Behravesh, J.M. Jorquera Valero, P. M. Sánchez Sánchez, M. Gil Pérez, G. Martínez Pérez, J. Taylor, J. Bonnet, P. Chainho, M. Mertiri, T. Bozios, A. Lekidis, V. Theodorou, D. Laskaratos, F. Bravo Díaz, A. Ramos, J.M. Mifsud, A. Sciberreas
2021 Zenodo  
This document presents the first version of the 5GZORRO high-level architecture  ...  /trustzone 2  ...  A characteristic example of software-based TEE is the Open Portable Trusted Execution Environment (OP-TEE) 2 .  ... 
doi:10.5281/zenodo.5561042 fatcat:o5ecnvwvifhmveigarvfgih3l4

Trusted SoC Realization for Remote Dynamic IP Integration

Nadir Muhammad Khan
In dieser Arbeit wird ein Pay-per-Use-Lizenzierungsschema vorgeschlagen und unter Verwendung eines security framework (SFW) realisiert, um all diese Herausforderungen anzugehen.  ...  They are part of an open-source project whose repository is available at [76] . build is a full OP-TEE developer setup for the OP-TEE project.  ...  Among others, PRC registers and two 16 MB memory blocks, a secure and a non-secure one, are registered with OP-TEE OS.  ... 
doi:10.5445/ir/1000140875 fatcat:iti34xew4ndpnb6cxhtadoljzq

Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications

Franz Ferdinand Peter Brasser
The TEE solutions developed by industry and deployed in today's systems follow distinct design approaches and come with various limitations.  ...  Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basis for the protection of modern software systems.  ...  OP-TEE is extended to validate load-time integrity of SAs and to enforce run-time isolation of SAs. Furthermore, Sanctuary's security services, e. g., for RA and sealing, are added to OP-TEE.  ... 
doi:10.25534/tuprints-00011912 fatcat:2xf7ax7tcvbhrn76cdvcesfj6e