2017
DOI: 10.1007/978-3-319-72359-4_50
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Authentication for Client Application Using ARM TrustZone

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Cryptographic key protection scheme for mobile devices Encrypting data to pervasive contexts [56] 2017 Communication security between building blocks LTZVisor: TrustZone is the key [57] 2017 Hypervisor architecture to assist virtualization An Effective Authentication for Client Application Using ARM Trust-Zone [58] 2017…”
Section: General Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Cryptographic key protection scheme for mobile devices Encrypting data to pervasive contexts [56] 2017 Communication security between building blocks LTZVisor: TrustZone is the key [57] 2017 Hypervisor architecture to assist virtualization An Effective Authentication for Client Application Using ARM Trust-Zone [58] 2017…”
Section: General Resultsmentioning
confidence: 99%
“…Protection for flow tracking application [59] Trusted framework to develop IoT applications [36] Protection for health data [73] Secure architecture for P2P scenarios [24] Protection for edge computing [63] Comparison between TEE and secure multi-party computation application [62] Protection for video application [46], [69] Secure logger [13], [76] Protection for system analyser [49] Societal model for IoT security [68] Protection for location-based services [60] Trusted auditor [47] Protection for data dissemination [61] Data encryption mechanism [56] Protection for data management [14] Data protection (app) [71] Protection for data aggregation (app) [75] Checker for Industrial gateway communications [52] Lightweithg anonymous authentication [25] Remote attestation mechanism [38] Device snapshot authentication system [32] Control-flow attestation [37] Authentication scheme [58] Remote attestation and channel protection [44] Secure authentication and key distribution [67] Boot attestation [53] Protection for data through authentication [50] Protection and attestation for remote terminal [65] Device private keys protection architecture [28] Remote attestation [64] Keys derivation from device characteristics [31] Authenticity detection service [40] Keys protection against cold boot attacks [55] Cache rootkit exploiting TrustZone [35] vendors, e.g., ARM and Intel, already present many of the general advantages, such as hardware isolation (normal world and the secure world) and mem...…”
Section: Tee Advantages and Disadvantagesmentioning
confidence: 99%
“…The non secure OS attaches the process id (pid) of the caller application to each request to the secure world. via code hash [1] via digital signature [2] context management apis what they are? how they work?…”
Section: Existing Solutionsmentioning
confidence: 99%
“…ARM TrustZone technologies aided smartphones to protect security-critical assets from potential breaches in the broader set of functionalities. ARM recently introduced TrustZone for microprocessors, namely TrustZone-M (TZ-M) 1 , intending to protect also IoT devices that are becoming ubiquitous and potentially more dangerous than smartphones if vulnerable to attacks.…”
Section: Introductionmentioning
confidence: 99%
“…First, the client application (CA) in the REE, which is responsible for calling the measurement modules, initiates the security request. Ten, the processor is switched to the TEE by calling the secure monitor call (SMC) command, and the trusted application (TA) responsible for the measurement work is executed [22,23]. If the API interface in the REE to call TA is broken, the measurement work in the TEE will be interrupted and will not provide security for systems and applications such as the Trojan Dvmap virus [24].…”
Section: Introductionmentioning
confidence: 99%