A trustzone-based trusted code execution with strong security requirements

被引:0
|
作者
Zhang, Yingjun [1 ]
Feng, Dengguo [1 ,2 ]
Qin, Yu [1 ]
Yang, Bo [1 ]
机构
[1] Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing,100190, China
[2] State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing,100190, China
关键词
Compendex;
D O I
10.7544/issn1000-1239.2015.20150582
中图分类号
学科分类号
摘要
Application programs
引用
收藏
页码:2224 / 2238
相关论文
共 50 条
  • [31] RPC Based Framework for Partitioning IoT Security Software for Trusted Execution Environments
    Fischer, Thomas
    Lesjak, Christian
    Pirker, Dominic
    Steger, Christian
    2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2019, : 430 - 435
  • [32] Trusted computing platform based executable code security inspecting model
    Chen, Ze-Mao
    Tang, Wei-Min
    Zhou, Li-Bing
    Liu, Jing-Chao
    Shen, Chang-Xiang
    Tongxin Xuebao/Journal on Communications, 2007, 28 (SUPPL.): : 112 - 116
  • [33] Self-secured devices: High performance and secure I/O access in TrustZone-based systems
    Pinto, Sandro
    Machado, Pedro
    Oliveira, Daniel
    Cerdeira, David
    Gomes, Tiago
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 119
  • [34] TrustHealth: Enhancing eHealth Security with Blockchain and Trusted Execution Environments
    Li, Jun
    Luo, Xinman
    Lei, Hong
    ELECTRONICS, 2024, 13 (12)
  • [35] Personal Database Security and Trusted Execution Environments: A Tutorial at the Crossroads
    Anciaux, Nicolas
    Bouganim, Luc
    Pucheral, Philippe
    Popa, Lulian Sandu
    Scerri, Guillaume
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2019, 12 (12): : 1994 - 1997
  • [36] Distributed Agent-based Architecture for Management of Crisis Situations using Trusted Code Execution
    Hluchy, L.
    Balogh, Z.
    Gatial, E.
    2010 IEEE 8TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS, 2010, : 25 - 30
  • [37] Design and Implementation of Security OS Based on TrustZone
    Luo Jing
    Jiang Chunhua
    Yan Xia
    PROCEEDINGS OF 2013 IEEE 11TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS (ICEMI), 2013, : 1027 - 1032
  • [38] Enhancing IoT Security and Privacy with Trusted Execution Environments and Machine Learning
    Yuhala, Peterson
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 176 - 178
  • [39] Trusted path execution for the Linux 2.6 kernel as a Linux Security Module
    Rahimi, NA
    USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK 2004 USENIX ANNUAL TECHNICAL CONFERENCE, 2004, : 73 - 80
  • [40] Trust-E : A Trusted Embedded Operating System Based on the ARM Trustzone
    Yang, Xia
    Shi, Peng
    Tian, Bo
    Zeng, Bing
    Xiao, Wei
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 495 - 501