Malicious Code Detection for Trusted Execution Environment Based on Paillier Homomorphic Encryption

被引:4
|
作者
Wang, Ziwang [1 ]
Zhuang, Yi [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Dept Comp Sci & Technol, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
trusted execution environment; malicious code detection; mobile security;
D O I
10.1587/transcom.2019EBP3098
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Currently, mobile terminals face serious security threats. A Trusted Execution Environment (TEE) which can provide an isolated execution environment for sensitive workloads, is seen as a trusted relay for providing security services for any mobile application. However, mobile TEE's architecture design and implementation strategy are not unbreakable at present. The existing researches lack of detect mechanisms for attack behaviour and malicious software. This paper proposes a Malicious code Detection scheme for Trusted Execution Environment based on Homomorphic Encryption (HE-TEEMD), which is a novel detection mechanism for data and code in the trusted execution environment. HE-TEEMD uses the Paillier additive homomorphic algorithm to implement the signature matching and transmits the ciphertext information generated in the TEE to the normal world for detection by the homomorphism and randomness of the homomorphic encryption ciphertext. An experiment and security analysis proves that our scheme can achieve malicious code detection in the secure world with minimal cost. Furthermore, evaluation parameters are introduced to address the known plaintext attack problem of privileged users.
引用
收藏
页码:155 / 166
页数:12
相关论文
共 50 条
  • [1] Combining Homomorphic Encryption with Trusted Execution Environment: A Demonstration with Paillier Encryption and SGX
    Drucker, Nir
    Gueron, Shay
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 85 - 88
  • [2] Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud
    Liu, Pinglan
    Zhang, Wensheng
    [J]. 2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD, 2023, : 529 - 539
  • [3] A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption
    Xu, Wenjia
    Xiang, Shijun
    Sachnev, Vasily
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (02): : 285 - 295
  • [4] A Reversible Data Hiding Algorithm for JPEG Image Based on Paillier Homomorphic Encryption
    Zhao, Chunxin
    Ma, Ruihe
    Xian, Yongjin
    [J]. DIGITAL FORENSICS AND WATERMARKING, IWDW 2023, 2024, 14511 : 207 - 222
  • [5] On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code
    Kosolapov, Y. V.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (07) : 827 - 837
  • [6] On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code
    Y. V. Kosolapov
    [J]. Automatic Control and Computer Sciences, 2021, 55 : 827 - 837
  • [7] CHEX-MIX: Combining Homomorphic Encryption with Trusted Execution Environments for Oblivious Inference in the Cloud
    Natarajan, Deepika
    Loveless, Andrew
    Dai, Wei
    Dreslinski, Ronald
    [J]. 2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 73 - 91
  • [8] Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code
    Y. V. Kosolapov
    [J]. Automatic Control and Computer Sciences, 2022, 56 : 828 - 828
  • [9] A Malicious Code Immune Model Based on Program Encryption
    Chen Zemao
    Wu Xiaoping
    Tang Weimin
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12617 - +
  • [10] TriNymAuth: Triple Pseudonym Authentication Scheme for VANETs Based on Cuckoo Filter and Paillier Homomorphic Encryption
    Zhuang, Luyuan
    Guo, Nan
    Chen, Yufan
    [J]. SENSORS, 2023, 23 (03)