2012
DOI: 10.1007/978-3-642-30921-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…These schemes lay the foundation for implementing DAA on the mobile platform. Although, Wachsmann et al [20] describe a lightweight DAA scheme applied on embedded devices, it does not meet the general standards of TPM APIs.…”
Section: Related Workmentioning
confidence: 97%
“…These schemes lay the foundation for implementing DAA on the mobile platform. Although, Wachsmann et al [20] describe a lightweight DAA scheme applied on embedded devices, it does not meet the general standards of TPM APIs.…”
Section: Related Workmentioning
confidence: 97%
“…The chosen mechanism for inter-environment communication must ensure reliability, maintain minimal overhead, and protect communication structures. Several models of communication have been identified in the literature, including the Glob-alPlatform TEE Client API, the secure Remote Procedure Call (RPC) of Trusted Language Runtime [21], and the real-time RPC of SafeG [22]. These models are designed to address the challenges associated with secure inter-environment communication and contribute to the secure and efficient operation of the TEE.…”
Section: Building Blocks Of Teementioning
confidence: 99%
“…The concept of self-secured devices is based on the self-virtualizing approach [23,24]. In the remaining of this section we describe existing shared device access approaches for virtualization-and TrustZone-based architectures, namely proxy task [18], para-TrustZone [9], and device re-partitioning [22].…”
Section: Related Workmentioning
confidence: 99%
“…Device re-partitioning allows a device that has been already assigned to a security state to be dynamically re-assigned to another, at run-time [22]. Devices can be configured and re-configured as part of the secure or normal world through the TrustZone Protection Controller (TZPC).…”
Section: Device Re-partitioningmentioning
confidence: 99%