Java Virtual Machine Specification
Java Virtual Machine Specification
An integrated architecture for trusted computing for java enabled embedded devices
Proceedings of the 2007 ACM workshop on Scalable trusted computing
A trusted mobile phone reference architecturevia secure kernel
Proceedings of the 2007 ACM workshop on Scalable trusted computing
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Code injection attacks on harvard-architecture devices
Proceedings of the 15th ACM conference on Computer and communications security
Trusted computing building blocks for embedded linux-based ARM trustzone platforms
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Scheduling execution of credentials in constrained secure environments
Proceedings of the 3rd ACM workshop on Scalable trusted computing
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
On-board credentials with open provisioning
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Flexible μTPMs through disembedding
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Towards a trustworthy, lightweight cloud computing framework for embedded systems
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Plug-n-trust: practical trusted sensing for mhealth
Proceedings of the 10th international conference on Mobile systems, applications, and services
Trustworthy execution on mobile devices: what security properties can my mobile platform give me?
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Hi-index | 0.00 |
Two different security extensions of mobile platforms for hosting Mobile Trusted Module (MTM) functionality have been introduced in recent years: the ARM TrustZone processor extension and Secure Elements. Both approaches can host MTMs which are typically designed as a static and fixed set of functions. However, with the increasing number of supported functions, the complexity of these MTMs is being raised and with it the resource requirements on the hosting security extension. Disembedding MTM functionality and dynamic loading of TPM commands can be a solution to reduce these requirements. In order to address this problem, we propose and analyze two approaches for providing modular, customizable MTM functionality which are based on currently available cell phones' security extensions. We propose two architectures in order to overcome the resource limitations of existing approaches and show how secure and dynamic command loading architectures can be established with the ARM TrustZone extension and Secure Elements.