A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Providing Root of Trust for ARM TrustZone using On-Chip SRAM
2014
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices - TrustED '14
We first implement a building block which provides the foundations for the root of trust: secure key storage and truly random source. ...
In one word, we leverage the on-chip SRAM, commonly available on mobile devices, to achieve a low-cost, secure, and efficient design of the root of trust. ...
ACKNOWLEDGMENTS We thank Yevgeniy Dodis, Sylvain Ruhault for their suggestions on building our secure RNG. ...
doi:10.1145/2666141.2666145
dblp:conf/ccs/ZhaoZHQF14
fatcat:r5qcnsuhsfbjhfkcgx6spfldbq
MQT-TZ: Hardening IoT Brokers Using ARM TrustZone
[article]
2020
arXiv
pre-print
This paper presents MQT-TZ, a secure MQTT broker leveraging Arm TrustZone, a trusted execution environment (TEE) commonly found even on inexpensive devices largely available on the market (such as Raspberry ...
We define a mutual TLS-based handshake and a two-layer encryption for end-to-end security using the TEE as a trusted proxy. ...
Conveniently, this device embeds an ARM Cortex-A processor with native support for TRUSTZONE. ...
arXiv:2007.12442v2
fatcat:sdoepy7yjrearktaqez3ei4emu
TrustZone Explained: Architectural Features and Use Cases
2016
2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)
As ARM is widely deployed on the majority of mobile and microcontroller devices, TrustZone's goal is to provide security for those platforms. ...
TrustZone is supported on different flavors of ARM architectures, that include architecture deployed on targets running regular applications, such as mobile devices and architecture for micro-controllers ...
However, TrustZone allows for faster adoption due to the popularity of ARM-platform smartphones and other mobile devices; any sensitive data like encryption keys can be handled by the secure world. ...
doi:10.1109/cic.2016.065
dblp:conf/coinco/NgabonzizaMBCM16
fatcat:w5nl3y3mdnanxn6hu76ykyli3q
TrustOTP
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15
In this paper, we present TrustOTP, a secure one-time password solution that can achieve both the flexibility of software tokens and the security of hardware tokens by using ARM TrustZone technique. ...
It is flexible to integrate multiple OTP algorithms and OTP instances for different application scenarios on the same smartphone platform without modifying the mobile OS. ...
For instance, MobiCore/Trustonics [33] is a secure Operating System for TrustZone enabled ARM controllers including ARM1176 or CortexA8/A9. ...
doi:10.1145/2810103.2813692
dblp:conf/ccs/SunSWJ15
fatcat:wcyezrc5a5fupa4qewnsrwuzam
TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone
2020
Security and Communication Networks
To ARM's mobile platform, we propose a mobile remote attestation scheme based on ARM TrustZone (TZ-MRAS), which uses the highest security authority of TrustZone to implement trusted attestation service ...
The experimental results show the proposed scheme has higher security and efficiency than some existing schemes. ...
ARM TrustZone. ARM TrustZone is the hardware solution for trusted computing on ARM devices. ...
doi:10.1155/2020/1756130
fatcat:cqxt55hkizgrbdvunpugrx7kae
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
[chapter]
2012
Lecture Notes in Computer Science
We consider the different stake-holders in today's mobile device ecosystem, and analyze why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers ...
We systematize existing proposals for leveraging such primitives, and show that they can indeed strengthen the security properties available to applications and users, all without reducing the properties ...
The views and conclusions contained here are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either express or implied, of CyLab, CMU ...
doi:10.1007/978-3-642-30921-2_10
fatcat:zcq7eutfrnh55gfxty4ogow7my
μRTZVisor: A Secure and Safe Real-Time Hypervisor
2017
Electronics
However, on its own, classical virtualization is a poor match for modern endpoint embedded system requirements such as safety, security and real-time, which are our main target. ...
Virtualization has been deployed as a key enabling technology for coping with the ever growing complexity and heterogeneity of modern computing systems. ...
The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results. ...
doi:10.3390/electronics6040093
fatcat:6h52bryx35chtdtajminydgoky
Building A Trusted Execution Environment for In-Storage Computing
[article]
2022
arXiv
pre-print
We develop IceClave with a full system simulator and evaluate IceClave with a variety of data-intensive applications. ...
To facilitate in-storage computing, many frameworks have been proposed. However, few of them consider security as the priority for in-storage computing. ...
We can use ARM TrustZone to create secure and normal worlds, and then place FTL functions in the secure world, and place all in-storage applications in the normal world. ...
arXiv:2205.06361v1
fatcat:66pjza2z2jdo5nt7nkzykeetbq
TrustShadow
2017
Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys '17
This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage. ...
TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. ...
Architecture ARM TrustZone partitions all of the System-on-Chip (SoC) hardware and software resources in one of two worlds -the secure world for the security subsystem, and the normal world for everything ...
doi:10.1145/3081333.3081349
dblp:conf/mobisys/GuanLXGZYJ17
fatcat:xadmj7sfrvhcvlz6llhlp2xyga
Integrity Enhancement in Wireless Sensor Networks
[chapter]
2010
Smart Wireless Sensor Networks
Due to the nature of WSNs that are left unattended and limited resources, there exist an urgent need for higher security features in sensor nodes and its overall systems. ...
Introduction Consideration for security level in Wireless Sensor Networks (WSN) should depend on the demand of the intended applications. ...
The ARM trust zone is specifically designed for smart phones, handheld devices and embedded systems that can potentially be compromised by malicious hackers. ...
doi:10.5772/13712
fatcat:r65jbllfzzc6bjgd5kxinkgmlu
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform
2018
EAI Endorsed Transactions on Security and Safety
Some of security implementations [5] [6] [7] are designed and implemented using TrustZone [8], a secure enclave provided by ARM on both Cortex-A and Cortex-M series. ...
In recent years, research efforts have been made to develop safe and secure environments for ARM platform. The new ARMv8 architecture brought in security features by design. ...
CRC is widely used in digital networks, and storage devices to detect abnormal data due to accidental changes to original data. ...
doi:10.4108/eai.25-1-2019.159346
fatcat:fpwldsbhvrfh7ek6tunu5gscs4
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM
2018
IEEE Transactions on Dependable and Secure Computing
To defeat cyber attacks, TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. ...
However, the smartness comes at the cost of multi-vector security exploits. From cyber space, a compromised operating system could access all the data in a cloud-aware IoT device. ...
This flexibility augments a TrustZone system with an ability to efficiently share memory across the worlds. ...
doi:10.1109/tdsc.2018.2861756
fatcat:cge7n5y2fbfu5duj6zgqn5gre4
Embedded security for Internet of Things
2011
2011 2nd National Conference on Emerging Trends and Applications in Computer Science
In order to circumvent the problem of security in IoT domain, networks and devices need to be secured. ...
Our paper attempts to address the issue of security for data at rest. Addressing this issue is equivalent to addressing the security issue of the hardware platform. ...
, safe storage and integrity checking to help ensure device and platform security. ...
doi:10.1109/ncetacs.2011.5751382
fatcat:6jw6woxxwzcvzadxl2h4kltj74
Using ARM trustzone to build a trusted language runtime for mobile applications
2014
Proceedings of the 19th international conference on Architectural support for programming languages and operating systems - ASPLOS '14
TLR provides runtime support for the secure component based on a .NET implementation for embedded devices. ...
This paper presents the design, implementation, and evaluation of the Trusted Language Runtime (TLR), a system that protects the confidentiality and integrity of .NET mobile applications from OS security ...
Another research area uses privilege separation for partitioning an application into security-sensitive and securityinsensitive components. ...
doi:10.1145/2541940.2541949
dblp:conf/asplos/SantosRSW14
fatcat:gocjg6d3e5efvoyumi7hmmht7m
TZDKS: A New TrustZone-Based Dual-Criticality System with Balanced Performance
2018
2018 IEEE 24th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)
Appropriate utilization of TrustZone extensions helps TZDKS to implement (i) virtualization environment for GPOS and RTOS, (ii) high efficient task switch, memory access, interrupt handling and device ...
Many mixed-criticality systems are composed of a RTOS (Real-Time Operating System) and a GPOS (General Purpose Operating System), and we define them as mixed-timesensitive systems. ...
TrustZone and TrustZone-based virtualization ARM TrustZone [16] is a hardware-based security extension technology incorporated into ARM processors. ...
doi:10.1109/rtcsa.2018.00016
dblp:conf/rtcsa/DongB0L18
fatcat:3y625jnbvbcxxfpwx7eixfsy2i
« Previous
Showing results 1 — 15 out of 299 results