Key Attestation from Trusted Execution Environments

被引:0
|
作者
Kostiainen, Kari [1 ]
Dmitrienko, Alexandra [2 ]
Ekberg, Jan-Erik [1 ]
Sadeghi, Ahmad-Reza [2 ]
Asokan, N. [1 ]
机构
[1] Nokia Res Ctr, Helsinki, Finland
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Security, Bochum, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Credential platforms implemented on top of Trusted Execution Environments' (TrEEs) allow users to store and use their credentials, e g, cryptographic keys or user passwords, securely One important requirement. for a TrEE-based credential platform is the ability to (West that a credential has been created and is kept within the TrEE Credential properties, such as usage permissions, should be also attested Existing attestation mechanisms are limited to attesting which applications outside the TrEE are authorized to use the credential In this paper we describe a novel key attestation mechanism that allows attestation of both TrEE internal and external key usage permissions We have implemented this attestation mechanism for mobile phones with M-Shield TrEE.
引用
收藏
页码:30 / +
页数:4
相关论文
共 50 条
  • [41] Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats
    Lacoste, Marc
    Lefebvre, Vincent
    IEEE SECURITY & PRIVACY, 2023, 21 (03) : 37 - 46
  • [42] A Secure IIoT Gateway Architecture based on Trusted Execution Environments
    Froehlich, Antonio Augusto
    Horstmann, Leonardo Passig
    Hoffmann, Jose Luis Conradi
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (02)
  • [43] Secure and Efficient Mobile DNN Using Trusted Execution Environments
    Hu, Bin
    Wang, Yan
    Cheng, Jerry
    Zhao, Tianming
    Xie, Yucheng
    Guo, Xiaonan
    Chen, Yingying
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 274 - 285
  • [44] Time to Rethink: Trust Brokerage Using Trusted Execution Environments
    Koeberl, Patrick
    Phegade, Vinay
    Rajan, Anand
    Schneider, Thomas
    Schulz, Steffen
    Zhdanova, Maria
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 181 - 190
  • [45] TrustHealth: Enhancing eHealth Security with Blockchain and Trusted Execution Environments
    Li, Jun
    Luo, Xinman
    Lei, Hong
    ELECTRONICS, 2024, 13 (12)
  • [46] Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms
    Ning, Zhenyu
    Liao, Jinghui
    Zhang, Fengwei
    Shi, Weisong
    2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 421 - 426
  • [47] A Secure IIoT Gateway Architecture based on Trusted Execution Environments
    Antônio Augusto Fröhlich
    Leonardo Passig Horstmann
    José Luis Conradi Hoffmann
    Journal of Network and Systems Management, 2023, 31
  • [48] SoK: Understanding Designs Choices and Pitfalls of Trusted Execution Environments
    Li, Mengyuan
    Yang, Yuheng
    Chen, Guoxing
    Yan, Mengjia
    Zhang, Yinqian
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1600 - 1616
  • [49] How Trusted Execution Environments Fuel Research on Microarchitectural Attacks
    Schwarz, Michael
    Gruss, Daniel
    IEEE SECURITY & PRIVACY, 2020, 18 (05) : 18 - 27
  • [50] Formal Verification of Virtualization-Based Trusted Execution Environments
    Witharana, Hasini
    Weerasena, Hansika
    Mishra, Prabhat
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (11) : 4262 - 4273