Analysis of Trusted Execution Environment usage in Samsung KNOX

被引:5
|
作者
Atamli-Reineh, Ahmad [1 ]
Borgaonkar, Ravishankar [1 ]
Balisane, Ranjbar A. [1 ]
Petracca, Giuseppe [2 ]
Martin, Andrew [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford, England
[2] Penn State Univ, Dept Comp Sci & Engn, State Coll, PA USA
基金
欧盟地平线“2020”;
关键词
Software Vulnerabilities; TEE; Mobile System Security; Samsung KNOX;
D O I
10.1145/3007788.3007795
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile systems have become widely adopted by users to perform sensitive operations ranging from on-line payments for personal use to remote access to enterprise assets. Thus, attacks on mobile devices can cause significant loss to user's personal data as well as to valuable enterprise assets. In order to mitigate risks arising from attacks, various approaches have been proposed including the use of Trusted Execution Environment (TEE) to isolate and protect the execution of sensitive code from the rest of the system, e.g. applications and other software.However, users remain at risk of exploits via several types of software vulnerabilities - indicating that enterprises have failed to deliver the required protection, despite the use of existing isolation technologies. In this paper, we investigate Samsung KNOX and its usage of TEE as being the current technology providing secure containers. First, we study how KNOX uses TEE and perform analysis on its design consideration from a system vulnerabilities perspective. Second, we analyse and discuss recent attacks on KNOX and how those attacks exploit system vulnerabilities. Finally, we present new shortcomings emerging from our analysis of KNOX architecture. Our research exhibits that system vulnerabilities are the underlying cause of many attacks on systems and it reveals how they affect fundamental design security principles when the full potential of TEE is not exploited.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Security Analysis of Samsung Knox
    Dorjmyagmar, Munkhzorig
    Kim, MinChang
    Kim, Hyoungshick
    [J]. 2017 19TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - OPENING NEW ERA OF SMART SOCIETY, 2017, : 550 - 553
  • [2] Awesome Trusted Execution Environment
    Coppolino, Luigi
    Mazzeo, Giovanni
    Romano, Luigi
    [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 5 - 6
  • [3] A Quantum Computer Trusted Execution Environment
    Trochatos, Theodoros
    Xu, Chuanqi
    Deshpande, Sanjay
    Lu, Yao
    Ding, Yongshan
    Szefer, Jakub
    [J]. IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 22 (02) : 177 - 180
  • [4] Trusted Execution Environment: What It Is, and What It Is Not
    Sabet, Mohamed
    Achemlal, Mohammed
    Bouabdallah, Abdelmadjid
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 57 - 64
  • [5] A Quantum Computer Trusted Execution Environment
    Trochatos, Theodoros
    Xu, Chuanqi
    Deshpande, Sanjay
    Lu, Yao
    Ding, Yongshan
    Szefer, Jakub
    [J]. 2024 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA 2024, 2024, : 613 - 613
  • [6] SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
    Jang, Jinsoo
    Kong, Sunjune
    Kim, Minsu
    Kim, Daegyeong
    Kang, Brent Byunghoon
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [7] Colony: A Privileged Trusted Execution Environment With Extensibility
    Xia, Yubin
    Hua, Zhichao
    Yu, Yang
    Gu, Jinyu
    Chen, Haibo
    Zang, Binyu
    Guan, Haibing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (02) : 479 - 492
  • [8] Securing a communication channel for the trusted execution environment
    Jang, Jinsoo
    Kang, Brent Byunghoon
    [J]. COMPUTERS & SECURITY, 2019, 83 : 79 - 92
  • [9] Formal Specification of Trusted Execution Environment APIs
    Yu, Geunyeol
    Chae, Seunghyun
    Bae, Kyungmin
    Moon, Sungkun
    [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2024, 2024, 14573 : 101 - 121
  • [10] Trusted Execution Environment for Decentralized Process Mining
    Goretti, Valerio
    Basile, Davide
    Barbaro, Luca
    Di Ciccio, Claudio
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING, CAISE 2024, 2024, 14663 : 509 - 527