2022
DOI: 10.48550/arxiv.2205.10963
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Protecting File Activities via Deception for ARM TrustZone

Abstract: A TrustZone TEE often invokes an external filesystem. While filedata can be encrypted, the revealed file activities leak secrets. To hide the file activities from the filesystem and its OS, we propose Enigma, a deception-based defense injecting sybil file activities as the cover of actual file activities.Enigma contributes three new designs. (1) To make the deception credible, the TEE generates sybil calls by replaying file calls from the TEE code under protection. (2) To make sybil activities cheap, the TEE r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 23 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?