2015
DOI: 10.1007/978-3-319-18467-8_37
|View full text |Cite
|
Sign up to set email alerts
|

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation

Abstract: Abstract. The dual-execution-environment approach (dual-EE) is a trusted model that was defined to allow mobile smart devices to guarantee tamper-resistant execution for highly sensitive applications. Although various solutions implementing dual-EE have been proposed in the literature, this model has not been formalized yet. In this paper, we revisit the dual-EE approach and propose a theoretical framework to systematize the design of dual-EE solutions regarding well-established primitives defined in the Multi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Kernel Separation is a fundamental concept of the TEE architecture, as it underpins the essential property of isolated execution. This concept was first introduced in the context of a dual-execution environment model [17]. The primary objective of the separation kernel is to facilitate the cohabitation of diverse systems requiring different security levels on a single platform.…”
Section: Building Blocks Of Teementioning
confidence: 99%
“…Kernel Separation is a fundamental concept of the TEE architecture, as it underpins the essential property of isolated execution. This concept was first introduced in the context of a dual-execution environment model [17]. The primary objective of the separation kernel is to facilitate the cohabitation of diverse systems requiring different security levels on a single platform.…”
Section: Building Blocks Of Teementioning
confidence: 99%
“…However, as SCs are not as powerful as generalpurpose controllers, splitting the execution environment into a secured world and into a normal world is suggested for instance by Vasudevan et al [16]. This splitting principle, also called security by isolation or dual-execution [17], is realized by implementing SCs as external hardware modules.…”
Section: Security Controller (Sc)mentioning
confidence: 99%
“…Tamper resistant hardware [28] such as security controllers (SCs) can be used to provide protected execution environments as well as secured data storage that mitigate side-channel and physical attacks. However, since SCs are not as powerful as general purpose controllers or dedicated hardware components, splitting the execution environment into a secured world and a normal world is suggested [29]. This splitting principle by implementing SCs as external hardware modules that can then be combined with general purpose CPUs.…”
Section: Tamper Resistant Hardwarementioning
confidence: 99%