Key Attestation from Trusted Execution Environments

被引:0
|
作者
Kostiainen, Kari [1 ]
Dmitrienko, Alexandra [2 ]
Ekberg, Jan-Erik [1 ]
Sadeghi, Ahmad-Reza [2 ]
Asokan, N. [1 ]
机构
[1] Nokia Res Ctr, Helsinki, Finland
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Security, Bochum, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Credential platforms implemented on top of Trusted Execution Environments' (TrEEs) allow users to store and use their credentials, e g, cryptographic keys or user passwords, securely One important requirement. for a TrEE-based credential platform is the ability to (West that a credential has been created and is kept within the TrEE Credential properties, such as usage permissions, should be also attested Existing attestation mechanisms are limited to attesting which applications outside the TrEE are authorized to use the credential In this paper we describe a novel key attestation mechanism that allows attestation of both TrEE internal and external key usage permissions We have implemented this attestation mechanism for mobile phones with M-Shield TrEE.
引用
收藏
页码:30 / +
页数:4
相关论文
共 50 条
  • [21] Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments
    Shepherd, Carlton
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [22] Automated Partitioning of Android Applications for Trusted Execution Environments
    Rubinov, Konstantin
    Rosculete, Lucia
    Mitra, Tulika
    Roychoudhury, Abhik
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, : 923 - 934
  • [23] Cracking-Like Join for Trusted Execution Environments
    Maliszewski, Kajetan
    Quiane-Ruiz, Jorge-Arnulfo
    Markl, Volker
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (09): : 2330 - 2343
  • [24] Information Flow Control for Distributed Trusted Execution Environments
    Gollamudi, Anitha
    Chong, Stephen
    Arden, Owen
    2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 304 - 318
  • [25] TEE-Perf: A Profiler for Trusted Execution Environments
    Bailleu, Maurice
    Dragoti, Donald
    Bhatotia, Pramod
    Fetzer, Christof
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 414 - 421
  • [26] On Making Emerging Trusted Execution Environments Accessible to Developers
    Nyman, Thomas
    McGillion, Brian
    Asokan, N.
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 58 - 67
  • [27] Obscuro: A Bitcoin Mixer using Trusted Execution Environments
    Tran, Muoi
    Luu, Loi
    Kang, Min Suk
    Bentov, Iddo
    Saxena, Prateek
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 692 - 701
  • [28] Keystone: An Open Framework for Architecting Trusted Execution Environments
    Lee, Dayeol
    Kohlbrenner, David
    Shinde, Shweta
    Asanovic, Krste
    Song, Dawn
    PROCEEDINGS OF THE FIFTEENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS'20), 2020,
  • [29] SeRoT: A Secure Runtime System on Trusted Execution Environments
    Liu, Jingbin
    Qin, Yu
    Feng, Dengguo
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 30 - 37
  • [30] The Untapped Potential of Trusted Execution Environments on Mobile Devices
    Ekberg, Jan-Erik
    Kostiainen, Kari
    Asokan, N.
    IEEE SECURITY & PRIVACY, 2014, 12 (04) : 29 - 37