Filters








269 Hits in 11.6 sec

Trusted computing building blocks for embedded linux-based ARM trustzone platforms

Johannes Winter
2008 Proceedings of the 3rd ACM workshop on Scalable trusted computing - STC '08  
This paper outlines an approach to merge TCG-style Trusted Computing concepts with ARM TrustZone technology in order to build an open Linux-based embedded trusted computing platform.  ...  ARM follows a different approach to mobile platform security, by extending platforms with hardware supported ARM TrustZone security [3] mechanisms.  ...  INTRODUCTION This paper outlines parts of an ongoing effort of the Trusted Computing Labs at IAIK to develop building blocks for secure embedded platforms.  ... 
doi:10.1145/1456455.1456460 dblp:conf/ccs/Winter08 fatcat:x4waayswbzbwrlutiqngtweoyu

Integrity Enhancement in Wireless Sensor Networks [chapter]

Yusnani Mohd, Habibah Hashim, Husna Zainol
2010 Smart Wireless Sensor Networks  
However, latest technology in embedded security combined (low power, on-SOC memory, small size) with trusted computing specifications (ensuring trusted communication and user) is believed to enhance security  ...  features for future WSNs applications.  ...  ., 2008) , both utilize Linux kernel 2.6 and ARM trustzone features.  ... 
doi:10.5772/13712 fatcat:r65jbllfzzc6bjgd5kxinkgmlu

Embedded security for Internet of Things

Arijit Ukil, Jaydip Sen, Sripad Koilakonda
2011 2011 2nd National Conference on Emerging Trends and Applications in Computer Science  
In this work, we provide the requirements of embedded security, the solutions to resist different attacks and the technology for defying temper proofing of the embedded devices by the concept of trusted  ...  Our paper attempts to address the issue of security for data at rest. Addressing this issue is equivalent to addressing the security issue of the hardware platform.  ...  Among the commercial releases, Trusted Platform Module by Atmel [13] and Trustzone by ARM [14] are worth mentioning.  ... 
doi:10.1109/ncetacs.2011.5751382 fatcat:6jw6woxxwzcvzadxl2h4kltj74

Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks [article]

Monowar Hasan, Sibin Mohan
2019 arXiv   pre-print
A working prototype of Contego-TEE was developed using embedded Linux kernel. We demonstrate the feasibility of our approach for a robotic vehicle running on an ARM-based platform.  ...  We use a trusted computing base available in commodity processors (such as ARM TrustZone) and propose an invariant checking mechanism to ensure the security and safety of the physical system.  ...  In this work we consider TrustZone as the building block of Contego-TEE due to wide acceptability of ARM processors for embedded IoT systems -although our framework can be ported into other TEE platforms  ... 
arXiv:1908.09444v1 fatcat:5jlj4y7sg5flpjgspln62eao3e

Providing Root of Trust for ARM TrustZone using On-Chip SRAM

Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng
2014 Proceedings of the 4th International Workshop on Trustworthy Embedded Devices - TrustED '14  
We present the design, implementation and evaluation of the root of trust for the Trusted Execution Environment (TEE) provided by ARM TrustZone based on the on-chip SRAM Physical Unclonable Functions (  ...  Based on the building block, we build the root of trust consisting of seal/unseal primitives for secure services running in the TEE, and a software-only TPM service running in the TEE which provides rich  ...  ACKNOWLEDGMENTS We thank Yevgeniy Dodis, Sylvain Ruhault for their suggestions on building our secure RNG.  ... 
doi:10.1145/2666141.2666145 dblp:conf/ccs/ZhaoZHQF14 fatcat:r5qcnsuhsfbjhfkcgx6spfldbq

TZDKS: A New TrustZone-Based Dual-Criticality System with Balanced Performance

Pan Dong, Alan Burns, Zhe Jiang, Xiangke Liao
2018 2018 IEEE 24th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)  
We propose the philosophy of utilizing TrustZone characteristics to optimize various mechanisms in MTSS. The second contribution is to propose a TrustZone-based solution -termed TZDKS -for MTSS.  ...  Appropriate utilization of TrustZone extensions helps TZDKS to implement (i) virtualization environment for GPOS and RTOS, (ii) high efficient task switch, memory access, interrupt handling and device  ...  TrustZone and TrustZone-based virtualization ARM TrustZone [16] is a hardware-based security extension technology incorporated into ARM processors.  ... 
doi:10.1109/rtcsa.2018.00016 dblp:conf/rtcsa/DongB0L18 fatcat:3y625jnbvbcxxfpwx7eixfsy2i

Using ARM trustzone to build a trusted language runtime for mobile applications

Nuno Santos, Himanshu Raj, Stefan Saroiu, Alec Wolman
2014 Proceedings of the 19th international conference on Architectural support for programming languages and operating systems - ASPLOS '14  
TLR provides runtime support for the secure component based on a .NET implementation for embedded devices.  ...  The main benefit of the TLR is to bring the developer benefits of managed code to trusted computing.  ...  Acknowledgments We are grateful to the anonymous reviewers for their comments.  ... 
doi:10.1145/2541940.2541949 dblp:conf/asplos/SantosRSW14 fatcat:gocjg6d3e5efvoyumi7hmmht7m

TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone

Ziwang Wang, Yi Zhuang, Zujia Yan
2020 Security and Communication Networks  
To ARM's mobile platform, we propose a mobile remote attestation scheme based on ARM TrustZone (TZ-MRAS), which uses the highest security authority of TrustZone to implement trusted attestation service  ...  platform is trusted by discovering an unknown fingerprint.  ...  ARM TrustZone. ARM TrustZone is the hardware solution for trusted computing on ARM devices.  ... 
doi:10.1155/2020/1756130 fatcat:cqxt55hkizgrbdvunpugrx7kae

A Method to Construct Dual-Kernel Trusted Computing Environment on Embedded System

Xiangying Kong, Yanhui Chen, Xuebing Chen
2014 International Journal of Security and Its Applications  
Finally, a prototype system is given, and the test results show that this method has built a trusted computing environment for embedded applications on existing hardware and software resources without  ...  Trusted kernel contains virtual trusted platform module (vTPM) module which can provide cryptographic functions and related services to the user kernel and guides flash to open up specific memory for platform  ...  Based on TPM or ETPM, scholars have conducted many researches and build some embedded trusted computing environment [6] [7] [8] [9] [10] .  ... 
doi:10.14257/ijsia.2014.8.5.24 fatcat:zu3n2d6f3vg5hnz5yyvhqz4ldq

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM
모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법

Hwi-Min Choi, Chang-Bok Jang, Joo-Man Kim
2014 Journal of Digital Convergence  
To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device.  ...  of ARM for preventing information leakage and hacking.  ...  ARM and TrustZone are registered trade marks of ARM Limited in the EU and elsewhere.  ... 
doi:10.14400/jdc.2014.12.10.299 fatcat:67o2j2gylbhczmty7ifalavpru

Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs

Fahad Siddiqui, Matthew Hagan, Sakir Sezer
2018 2018 31st IEEE International System-on-Chip Conference (SOCC)  
They provide hardware components for building a system security foundation, based on the principles of information assurance, trust and security.  ...  Adoption of the proposed approach will be easy to adopt in embedded architectures build upon different software stacks such as bare-metal, embedded Linux, RTOS, hypervisor, device-drivers etc.  ... 
doi:10.1109/socc.2018.8618531 dblp:conf/socc/SiddiquiHS18 fatcat:4rxzt7pdwra6xgx7mrzytdpqou

TrustShadow

Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger
2017 Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys '17  
A variety of applications now run simultaneously on an ARM-based processor.  ...  TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds.  ...  the following contributions. • We propose a system -TrustShadow-for ARM-based multi-programming platforms.  ... 
doi:10.1145/3081333.3081349 dblp:conf/mobisys/GuanLXGZYJ17 fatcat:xadmj7sfrvhcvlz6llhlp2xyga

Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? [chapter]

Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, Jonathan M. McCune
2012 Lecture Notes in Computer Science  
We consider the different stake-holders in today's mobile device ecosystem, and analyze why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers  ...  We also highlight shortcomings of existing proposals and make recommendations for future research that may yield practical, deployable results.  ...  Winter outlines an approach to merge TCG-style Trusted Computing concepts with ARM TrustZone technology in order to build an open Linux-based embedded trusted computing platform.  ... 
doi:10.1007/978-3-642-30921-2_10 fatcat:zcq7eutfrnh55gfxty4ogow7my

Developing Secure Services for IoT with OP-TEE: A First Look at Performance and Usability [article]

Christian Göttel, Pascal Felber, Valerio Schiavoni
2019 arXiv   pre-print
Since 15 years, ARM processors are providing support for TrustZone, a set of security instructions that realize a trusted execution environment inside the processor.  ...  OP-TEE is a free-software framework to implement trusted applications and services for TrustZone.  ...  Limiting the space available to a TA is sensible, in order to minimize the trusted computing base.  ... 
arXiv:1904.11545v1 fatcat:3xztxkr7ovarlkoghzbhscwlam

TrustZone Explained: Architectural Features and Use Cases

Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, Sarah Martin
2016 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)  
As ARM is widely deployed on the majority of mobile and microcontroller devices, TrustZone's goal is to provide security for those platforms.  ...  We will also compare TrustZone with other implementations of trusted execution environments on the market.  ...  While Trustzone and secure element are mainly used for Mobile devices, Trusted Platform Modules are mainly deployed on Notebook PCs.  ... 
doi:10.1109/cic.2016.065 dblp:conf/coinco/NgabonzizaMBCM16 fatcat:w5nl3y3mdnanxn6hu76ykyli3q
« Previous Showing results 1 — 15 out of 269 results