Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems 2014
DOI: 10.1145/2541940.2541949
|View full text |Cite
|
Sign up to set email alerts
|

Using ARM trustzone to build a trusted language runtime for mobile applications

Abstract: This paper presents the design, implementation, and evaluation of the Trusted Language Runtime (TLR), a system that protects the confidentiality and integrity of .NET mobile applications from OS security breaches. TLR enables separating an application's security-sensitive logic from the rest of the application, and isolates it from the OS and other apps. TLR provides runtime support for the secure component based on a .NET implementation for embedded devices. TLR reduces the TCB of an open source .NET implemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 151 publications
(67 citation statements)
references
References 20 publications
0
66
0
1
Order By: Relevance
“…However, each mechanism should satisfy three key attributes: reliability (memory/time isolation), minimum overhead (unnecessary data copies and context switches), and protection of communication structures. In the literature, we identify three models of communication: (1) GlobalPlatform TEE Client API [26]; (2) secure RPC (Remote Procedure Call) of Trusted Language Runtime [6]; and (3) real-time RPC of SafeG [27]. Secure inter-environment communication is proposed in [28].…”
Section: Tee Building Blocksmentioning
confidence: 99%
See 2 more Smart Citations
“…However, each mechanism should satisfy three key attributes: reliability (memory/time isolation), minimum overhead (unnecessary data copies and context switches), and protection of communication structures. In the literature, we identify three models of communication: (1) GlobalPlatform TEE Client API [26]; (2) secure RPC (Remote Procedure Call) of Trusted Language Runtime [6]; and (3) real-time RPC of SafeG [27]. Secure inter-environment communication is proposed in [28].…”
Section: Tee Building Blocksmentioning
confidence: 99%
“…We only mention seven of them: (1) Genode TEE defined by Genode Labs [35]; (2) [49]; and (7) TLR defined by Microsoft Research [6].…”
Section: B Academic Teesmentioning
confidence: 99%
See 1 more Smart Citation
“…While ARMlock prevents code from reading the contents of other sandboxes, it cannot support our use-case of preventing read accesses to code inside the sandbox. Santos et al [44] use the ARM TrustZone feature to build a trusted language runtime (TLR); while this greatly reduces the TCB of an open source .NET implementations the performance cost is high. Unlike LR 2 , these approaches rely on features that limit their applicability to certain hardware platforms.…”
Section: Related Workmentioning
confidence: 99%
“…This approach requires a redesign of operating systems, thereby requiring nontrivial modifications to port existing applications. Third, the dual-execution-environment approach (dual-EE), such as TLR [22], solves the problem by multiplexing the feature-rich OS and a specialized OS with restricted functionalities on the same smart device. It relies on the specialized OS to provide tamper-resistant capabilities.…”
Section: Introductionmentioning
confidence: 99%