299 Hits in 4.5 sec

Providing Root of Trust for ARM TrustZone using On-Chip SRAM

Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng
2014 Proceedings of the 4th International Workshop on Trustworthy Embedded Devices - TrustED '14  
We first implement a building block which provides the foundations for the root of trust: secure key storage and truly random source.  ...  In one word, we leverage the on-chip SRAM, commonly available on mobile devices, to achieve a low-cost, secure, and efficient design of the root of trust.  ...  ACKNOWLEDGMENTS We thank Yevgeniy Dodis, Sylvain Ruhault for their suggestions on building our secure RNG.  ... 
doi:10.1145/2666141.2666145 dblp:conf/ccs/ZhaoZHQF14 fatcat:r5qcnsuhsfbjhfkcgx6spfldbq

MQT-TZ: Hardening IoT Brokers Using ARM TrustZone [article]

Carlos Segarra and Ricard Delgado-Gonzalo and Valerio Schiavoni
2020 arXiv   pre-print
This paper presents MQT-TZ, a secure MQTT broker leveraging Arm TrustZone, a trusted execution environment (TEE) commonly found even on inexpensive devices largely available on the market (such as Raspberry  ...  We define a mutual TLS-based handshake and a two-layer encryption for end-to-end security using the TEE as a trusted proxy.  ...  Conveniently, this device embeds an ARM Cortex-A processor with native support for TRUSTZONE.  ... 
arXiv:2007.12442v2 fatcat:sdoepy7yjrearktaqez3ei4emu

TrustZone Explained: Architectural Features and Use Cases

Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, Sarah Martin
2016 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)  
As ARM is widely deployed on the majority of mobile and microcontroller devices, TrustZone's goal is to provide security for those platforms.  ...  TrustZone is supported on different flavors of ARM architectures, that include architecture deployed on targets running regular applications, such as mobile devices and architecture for micro-controllers  ...  However, TrustZone allows for faster adoption due to the popularity of ARM-platform smartphones and other mobile devices; any sensitive data like encryption keys can be handled by the secure world.  ... 
doi:10.1109/cic.2016.065 dblp:conf/coinco/NgabonzizaMBCM16 fatcat:w5nl3y3mdnanxn6hu76ykyli3q


He Sun, Kun Sun, Yuewu Wang, Jiwu Jing
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
In this paper, we present TrustOTP, a secure one-time password solution that can achieve both the flexibility of software tokens and the security of hardware tokens by using ARM TrustZone technique.  ...  It is flexible to integrate multiple OTP algorithms and OTP instances for different application scenarios on the same smartphone platform without modifying the mobile OS.  ...  For instance, MobiCore/Trustonics [33] is a secure Operating System for TrustZone enabled ARM controllers including ARM1176 or CortexA8/A9.  ... 
doi:10.1145/2810103.2813692 dblp:conf/ccs/SunSWJ15 fatcat:wcyezrc5a5fupa4qewnsrwuzam

TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone

Ziwang Wang, Yi Zhuang, Zujia Yan
2020 Security and Communication Networks  
To ARM's mobile platform, we propose a mobile remote attestation scheme based on ARM TrustZone (TZ-MRAS), which uses the highest security authority of TrustZone to implement trusted attestation service  ...  The experimental results show the proposed scheme has higher security and efficiency than some existing schemes.  ...  ARM TrustZone. ARM TrustZone is the hardware solution for trusted computing on ARM devices.  ... 
doi:10.1155/2020/1756130 fatcat:cqxt55hkizgrbdvunpugrx7kae

Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? [chapter]

Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, Jonathan M. McCune
2012 Lecture Notes in Computer Science  
We consider the different stake-holders in today's mobile device ecosystem, and analyze why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers  ...  We systematize existing proposals for leveraging such primitives, and show that they can indeed strengthen the security properties available to applications and users, all without reducing the properties  ...  The views and conclusions contained here are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either express or implied, of CyLab, CMU  ... 
doi:10.1007/978-3-642-30921-2_10 fatcat:zcq7eutfrnh55gfxty4ogow7my

μRTZVisor: A Secure and Safe Real-Time Hypervisor

José Martins, João Alves, Jorge Cabral, Adriano Tavares, Sandro Pinto
2017 Electronics  
However, on its own, classical virtualization is a poor match for modern endpoint embedded system requirements such as safety, security and real-time, which are our main target.  ...  Virtualization has been deployed as a key enabling technology for coping with the ever growing complexity and heterogeneity of modern computing systems.  ...  The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.  ... 
doi:10.3390/electronics6040093 fatcat:6h52bryx35chtdtajminydgoky

Building A Trusted Execution Environment for In-Storage Computing [article]

Yuqi Xue, Luyi Kang, Weiwei Jia, Xiaohao Wang, Jongryool Kim, Changhwan Youn, Myeong Joon Kang, Hyung Jin Lim, Bruce Jacob, Jian Huang
2022 arXiv   pre-print
We develop IceClave with a full system simulator and evaluate IceClave with a variety of data-intensive applications.  ...  To facilitate in-storage computing, many frameworks have been proposed. However, few of them consider security as the priority for in-storage computing.  ...  We can use ARM TrustZone to create secure and normal worlds, and then place FTL functions in the secure world, and place all in-storage applications in the normal world.  ... 
arXiv:2205.06361v1 fatcat:66pjza2z2jdo5nt7nkzykeetbq


Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger
2017 Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys '17  
This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage.  ...  TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds.  ...  Architecture ARM TrustZone partitions all of the System-on-Chip (SoC) hardware and software resources in one of two worlds -the secure world for the security subsystem, and the normal world for everything  ... 
doi:10.1145/3081333.3081349 dblp:conf/mobisys/GuanLXGZYJ17 fatcat:xadmj7sfrvhcvlz6llhlp2xyga

Integrity Enhancement in Wireless Sensor Networks [chapter]

Yusnani Mohd, Habibah Hashim, Husna Zainol
2010 Smart Wireless Sensor Networks  
Due to the nature of WSNs that are left unattended and limited resources, there exist an urgent need for higher security features in sensor nodes and its overall systems.  ...  Introduction Consideration for security level in Wireless Sensor Networks (WSN) should depend on the demand of the intended applications.  ...  The ARM trust zone is specifically designed for smart phones, handheld devices and embedded systems that can potentially be compromised by malicious hackers.  ... 
doi:10.5772/13712 fatcat:r65jbllfzzc6bjgd5kxinkgmlu

Adaptive Noise Injection against Side-Channel Attacks on ARM Platform

Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu, Ravi Sandhu
2018 EAI Endorsed Transactions on Security and Safety  
Some of security implementations [5] [6] [7] are designed and implemented using TrustZone [8], a secure enclave provided by ARM on both Cortex-A and Cortex-M series.  ...  In recent years, research efforts have been made to develop safe and secure environments for ARM platform. The new ARMv8 architecture brought in security features by design.  ...  CRC is widely used in digital networks, and storage devices to detect abnormal data due to accidental changes to original data.  ... 
doi:10.4108/eai.25-1-2019.159346 fatcat:fpwldsbhvrfh7ek6tunu5gscs4

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger
2018 IEEE Transactions on Dependable and Secure Computing  
To defeat cyber attacks, TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds.  ...  However, the smartness comes at the cost of multi-vector security exploits. From cyber space, a compromised operating system could access all the data in a cloud-aware IoT device.  ...  This flexibility augments a TrustZone system with an ability to efficiently share memory across the worlds.  ... 
doi:10.1109/tdsc.2018.2861756 fatcat:cge7n5y2fbfu5duj6zgqn5gre4

Embedded security for Internet of Things

Arijit Ukil, Jaydip Sen, Sripad Koilakonda
2011 2011 2nd National Conference on Emerging Trends and Applications in Computer Science  
In order to circumvent the problem of security in IoT domain, networks and devices need to be secured.  ...  Our paper attempts to address the issue of security for data at rest. Addressing this issue is equivalent to addressing the security issue of the hardware platform.  ...  , safe storage and integrity checking to help ensure device and platform security.  ... 
doi:10.1109/ncetacs.2011.5751382 fatcat:6jw6woxxwzcvzadxl2h4kltj74

Using ARM trustzone to build a trusted language runtime for mobile applications

Nuno Santos, Himanshu Raj, Stefan Saroiu, Alec Wolman
2014 Proceedings of the 19th international conference on Architectural support for programming languages and operating systems - ASPLOS '14  
TLR provides runtime support for the secure component based on a .NET implementation for embedded devices.  ...  This paper presents the design, implementation, and evaluation of the Trusted Language Runtime (TLR), a system that protects the confidentiality and integrity of .NET mobile applications from OS security  ...  Another research area uses privilege separation for partitioning an application into security-sensitive and securityinsensitive components.  ... 
doi:10.1145/2541940.2541949 dblp:conf/asplos/SantosRSW14 fatcat:gocjg6d3e5efvoyumi7hmmht7m

TZDKS: A New TrustZone-Based Dual-Criticality System with Balanced Performance

Pan Dong, Alan Burns, Zhe Jiang, Xiangke Liao
2018 2018 IEEE 24th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)  
Appropriate utilization of TrustZone extensions helps TZDKS to implement (i) virtualization environment for GPOS and RTOS, (ii) high efficient task switch, memory access, interrupt handling and device  ...  Many mixed-criticality systems are composed of a RTOS (Real-Time Operating System) and a GPOS (General Purpose Operating System), and we define them as mixed-timesensitive systems.  ...  TrustZone and TrustZone-based virtualization ARM TrustZone [16] is a hardware-based security extension technology incorporated into ARM processors.  ... 
doi:10.1109/rtcsa.2018.00016 dblp:conf/rtcsa/DongB0L18 fatcat:3y625jnbvbcxxfpwx7eixfsy2i
« Previous Showing results 1 — 15 out of 299 results