Analysis of Trusted Execution Environment usage in Samsung KNOX

被引:5
|
作者
Atamli-Reineh, Ahmad [1 ]
Borgaonkar, Ravishankar [1 ]
Balisane, Ranjbar A. [1 ]
Petracca, Giuseppe [2 ]
Martin, Andrew [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford, England
[2] Penn State Univ, Dept Comp Sci & Engn, State Coll, PA USA
基金
欧盟地平线“2020”;
关键词
Software Vulnerabilities; TEE; Mobile System Security; Samsung KNOX;
D O I
10.1145/3007788.3007795
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile systems have become widely adopted by users to perform sensitive operations ranging from on-line payments for personal use to remote access to enterprise assets. Thus, attacks on mobile devices can cause significant loss to user's personal data as well as to valuable enterprise assets. In order to mitigate risks arising from attacks, various approaches have been proposed including the use of Trusted Execution Environment (TEE) to isolate and protect the execution of sensitive code from the rest of the system, e.g. applications and other software.However, users remain at risk of exploits via several types of software vulnerabilities - indicating that enterprises have failed to deliver the required protection, despite the use of existing isolation technologies. In this paper, we investigate Samsung KNOX and its usage of TEE as being the current technology providing secure containers. First, we study how KNOX uses TEE and perform analysis on its design consideration from a system vulnerabilities perspective. Second, we analyse and discuss recent attacks on KNOX and how those attacks exploit system vulnerabilities. Finally, we present new shortcomings emerging from our analysis of KNOX architecture. Our research exhibits that system vulnerabilities are the underlying cause of many attacks on systems and it reveals how they affect fundamental design security principles when the full potential of TEE is not exploited.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment
    Xu, Peng
    Sun, Ruijie
    Wang, Wei
    Chen, Tianyang
    Zheng, Yubo
    Jin, Hai
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 32 - 40
  • [42] Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario
    Nan Yang
    Li Yang
    Xingzhou Du
    Xunyi Guo
    Fanke Meng
    Yuwen Zhang
    [J]. Journal of Cloud Computing, 12
  • [43] Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
    Ruan, Anbang
    Shen, Qingni
    Gu, Liang
    Wang, Li
    Shi, Lei
    Yang, Yahui
    Chen, Zhong
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 226 - +
  • [44] Memory Optimization System for SGXv2 Trusted Execution Environment
    Li M.-Y.
    Xia Y.-B.
    Chen H.-B.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2022, 33 (06): : 2012 - 2029
  • [45] IoT Access Control Model Based on Blockchain and Trusted Execution Environment
    Jiang, Weijin
    Li, En
    Zhou, Wenying
    Yang, Ying
    Luo, Tiantian
    [J]. PROCESSES, 2023, 11 (03)
  • [46] Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling
    Trong-Thuc Hoang
    Duran, Ckristian
    Serrano, Ronaldo
    Sarmiento, Marco
    Khai-Duy Nguyen
    Tsukamoto, Akira
    Suzaki, Kuniyasu
    Cong-Kha Pham
    [J]. IEEE ACCESS, 2022, 10 : 46014 - 46027
  • [47] Cryptographic Accelerators for Trusted Execution Environment in RISC-V processors
    Hoang, Trong-Thuc
    Duran, Ckristian
    Tsukamoto, Akira
    Suzaki, Kuniyasu
    Pham, Cong-Kha
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [48] AccShield: a New Trusted Execution Environment with Machine-Learning Accelerators
    Ren, Wei
    Kozlowski, William
    Koteshwara, Sandhya
    Ye, Mengmei
    Franke, Hubertus
    Chen, Deming
    [J]. 2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [49] MIPE: a practical memory integrity protection method in a trusted execution environment
    Chang, Rui
    Jiang, Liehui
    Chen, Wenzhi
    Xiang, Yang
    Cheng, Yuxia
    Alelaiwi, Abdulhameed
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (02): : 1075 - 1087
  • [50] TBFT: Efficient Byzantine Fault Tolerance Using Trusted Execution Environment
    Zhang, Jiashuo
    Gao, Jianbo
    Wang, Ke
    Wu, Zhenhao
    Li, Yue
    Guan, Zhi
    Chen, Zhong
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 1004 - 1009