An integrated architecture for trusted computing for java enabled embedded devices
Proceedings of the 2007 ACM workshop on Scalable trusted computing
A trusted mobile phone reference architecturevia secure kernel
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Implementing Embedded Security on Dual-Virtual-CPU Systems
IEEE Design & Test
Implementation Aspects of Mobile and Embedded Trusted Computing
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Applications of trusted computing in pervasive smart camera networks
WESS '09 Proceedings of the 4th Workshop on Embedded Systems Security
Trust in a small package: minimized MRTM software implementation for mobile secure environments
Proceedings of the 2009 ACM workshop on Scalable trusted computing
Cumulative attestation kernels for embedded systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Implementing an application-specific credential platform using late-launched mobile trusted module
Proceedings of the fifth ACM workshop on Scalable trusted computing
Towards customizable, application specific mobile trusted modules
Proceedings of the fifth ACM workshop on Scalable trusted computing
Anonymous RFID authentication using trusted computing technologies
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Securing embedded smart cameras with trusted computing
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Towards a trustworthy, lightweight cloud computing framework for embedded systems
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Practical and lightweight domain isolation on Android
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
YouProve: authenticity and fidelity in mobile sensing
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Anonymous client authentication for transport layer security
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Trusted language runtime (TLR): enabling trusted applications on smartphones
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
A flexible software development and emulation framework for ARM trustzone
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Trustworthy execution on mobile devices: what security properties can my mobile platform give me?
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Splitting the bill for mobile data with SIMlets
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications
Hi-index | 0.00 |
Security is an emerging topic in the field of mobile and embedded platforms. The Trusted Computing Group (TCG) has outlined one possible approach to mobile platform security by recently extending their set of Trusted Computing specifications with Mobile Trusted Modules (MTMs). The MTM specification [13] published by the TCG is a platform independent approach to Trusted Computing explicitly allowing for a wide range of potential implementations. ARM follows a different approach to mobile platform security, by extending platforms with hardware supported ARM TrustZone security [3] mechanisms. This paper outlines an approach to merge TCG-style Trusted Computing concepts with ARM TrustZone technology in order to build an open Linux-based embedded trusted computing platform.