2021
DOI: 10.3390/s21020520
|View full text |Cite
|
Sign up to set email alerts
|

Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone

Abstract: TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. Although TEEs have been promoted as the starting point for establishing a device root of trust, a number of published attacks against the most broadly utilized TEE implementations request a second view on their security. The aim of this research is to provide an analytical and educational exploration of TrustZone-based TE… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 58 publications
0
13
0
Order By: Relevance
“…The Trusted Execution Environment (TEE) [44] can be considered a sandbox capable of executing applications (named Trusted Applications). The isolation of the normal operating system from the TEE entails a secure environment, where applications of the normal world including malicious software are out of reach of sensitive data either stored in TEE or utilized by trusted applications.…”
Section: Trusted Execution Environment (Tee)mentioning
confidence: 99%
See 1 more Smart Citation
“…The Trusted Execution Environment (TEE) [44] can be considered a sandbox capable of executing applications (named Trusted Applications). The isolation of the normal operating system from the TEE entails a secure environment, where applications of the normal world including malicious software are out of reach of sensitive data either stored in TEE or utilized by trusted applications.…”
Section: Trusted Execution Environment (Tee)mentioning
confidence: 99%
“…However, the use of TEE hinders malware from executing arbitrary code and accessing the stored secret since TEE has the highest privileges in the OS. As a result, malware must also find an exploit to break TEE in order to read private information stored in the secure world [44]. On the other hand, the Idemix master secret being the equivalent of a private key, can be considered as a solution for non-repudiation (S3-Non-repudiation).…”
Section: Security and Privacy Analysismentioning
confidence: 99%
“…We decided to utilize the TrustZone TEE [ 28 ] for the SealedGRID platform, since it provides a wide range of functionality in isolated environments. Also, TrustZone is suitable for the use in low powered devices (IoT, smart meters etc.).…”
Section: Trusted Computing Componentmentioning
confidence: 99%
“…a smartphone), in an external element such as a flash memory card, in the circuitry of devices such as the SIM card itself used in mobile phones, or as a cloud service in Host Card Emulation technology. A new family of embedded environments known as Trusted Execution Environments (TEE) [25,26] has emerged. A TEE is a hardware environment with a secure operating system that is isolated and completely separated from the mobile platform.…”
Section: Secure Element As Trust Anchormentioning
confidence: 99%
“…For example, packet 1 may be 100 bytes starting at offset 0. Packet 2 may be 100 bytes starting at offset25. Packet 2 will overwrite 75 bytes of packet 1.…”
mentioning
confidence: 99%