2019
DOI: 10.1049/iet-ifs.2018.5031
|View full text |Cite
|
Sign up to set email alerts
|

Build a trusted storage system on a mobile phone

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 27 publications
(24 reference statements)
0
1
0
Order By: Relevance
“…First, the client application (CA) in the REE, which is responsible for calling the measurement modules, initiates the security request. Ten, the processor is switched to the TEE by calling the secure monitor call (SMC) command, and the trusted application (TA) responsible for the measurement work is executed [22,23]. If the API interface in the REE to call TA is broken, the measurement work in the TEE will be interrupted and will not provide security for systems and applications such as the Trojan Dvmap virus [24].…”
Section: Introductionmentioning
confidence: 99%
“…First, the client application (CA) in the REE, which is responsible for calling the measurement modules, initiates the security request. Ten, the processor is switched to the TEE by calling the secure monitor call (SMC) command, and the trusted application (TA) responsible for the measurement work is executed [22,23]. If the API interface in the REE to call TA is broken, the measurement work in the TEE will be interrupted and will not provide security for systems and applications such as the Trojan Dvmap virus [24].…”
Section: Introductionmentioning
confidence: 99%