A trustzone-based trusted code execution with strong security requirements

被引:0
|
作者
Zhang, Yingjun [1 ]
Feng, Dengguo [1 ,2 ]
Qin, Yu [1 ]
Yang, Bo [1 ]
机构
[1] Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing,100190, China
[2] State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing,100190, China
关键词
Compendex;
D O I
10.7544/issn1000-1239.2015.20150582
中图分类号
学科分类号
摘要
Application programs
引用
收藏
页码:2224 / 2238
相关论文
共 50 条
  • [21] VOSYSmonitor, a TrustZone-based Hypervisor for ISO 26262 Mixed-critical System
    Lucas, Pierre
    Chappuis, Kevin
    Boutin, Benjamin
    Vetter, Julian
    Raho, Daniel
    PROCEEDINGS OF THE 2018 23RD CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2018, : 231 - 238
  • [22] A new mechanism for trusted code remote execution
    Zhang, Liqiang
    Zhang, Huanguo
    Zhang, Xiantao
    Chen, Lu
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 574 - 577
  • [23] TrustPAY: Trusted Mobile Payment on Security Enhanced ARM TrustZone Platforms
    Zheng, Xianyi
    Yang, Lulu
    Ma, Jiangang
    Shi, Gang
    Meng, Dan
    2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 456 - 462
  • [24] On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers
    Li, Zhiang
    Mashima, Daisuke
    Ong, Wen Shei
    Esiner, Ertem
    Kalbarczyk, Zbigniew
    Chang, Ee-Chien
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 957 - 971
  • [25] A trusted source-based model of mobile code security
    Liu, Wei-Wei
    Li, Xiao-Yong
    Han, Zhen
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2154 - 2157
  • [26] T2Droid: A TrustZone-based Dynamic Analyser for Android Applications
    Yalew, Sileshi Demesie
    Maguire, Gerald Q., Jr.
    Haridi, Seif
    Correia, Miguel
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 240 - 247
  • [27] TZDKS: A New TrustZone-based Dual-Criticality System with Balanced Performance
    Dong, Pan
    Burns, Alan
    Jiang, Zhe
    Liao, Xiangke
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA), 2018, : 59 - 64
  • [28] Malicious Code Detection for Trusted Execution Environment Based on Paillier Homomorphic Encryption
    Wang, Ziwang
    Zhuang, Yi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2020, E103B (03) : 155 - 166
  • [29] Satem: Trusted service code execution across transactions
    Xu, Gang
    Borcea, Cristian
    Iftode, Liviu
    SRDS 2006: 25TH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, : 321 - 334
  • [30] STBEAT: Software Update on Trusted Environment Based on ARM TrustZone
    Huang, Qi-Xian
    Chiu, Min-Yi
    Yeh, Chi-Shen
    Sun, Hung-Min
    SUSTAINABILITY, 2022, 14 (20)