TZMon: Improving mobile game security with ARM trustzone

被引:5
|
作者
Jeon, Sanghoon [1 ,2 ]
Kim, Huy Kang [2 ]
机构
[1] Samsung Elect, Suwon, South Korea
[2] Korea Univ, Sch Cybersecur, Seoul, South Korea
关键词
Mobile Game Security; ARM TrustZone; OPTEE; Application Integrity; Secure Update;
D O I
10.1016/j.cose.2021.102391
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the game industry is moving from PC to smartphone platforms, security problems related to mobile games are becoming critical. Considering the characteristics of mobile games such as having short life-cycles and high communication costs, the server/network-side security technologies designed for PC games are not appropriate for mobile games. In this study, we propose TZMon, a client-side game protection mechanism based on the ARM TrustZone, which protects the confidentiality and integrity of mobile games. TZMon is composed of application integrity protocol, secure update protocol, data hiding protocol, and timer synchronization protocol. To adequately safeguard game codes and data, TZMon is designed considering an environment of frequent communications with the game server, a standalone operation environment, and an unreliable environment using a rooted OS. Furthermore, flexibility is provided to game application developers who apply security policies by using the Java Native Interface (JNI). In this study, we use Android and the Open Portable Trusted Execution Environment (OPTEE) as the OS platforms for Normal World and Secure World, respectively. After implementing a full-featured prototype of TZMon, we apply it to several open-source mobile games. We prove through the experiments that the application of the proposed TZMon does not cause any noticeable performance degradation and can detect major cheating techniques of mobile games. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] TrustPAY: Trusted Mobile Payment on Security Enhanced ARM TrustZone Platforms
    Zheng, Xianyi
    Yang, Lulu
    Ma, Jiangang
    Shi, Gang
    Meng, Dan
    [J]. 2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 456 - 462
  • [2] On the Security Evaluation of the ARM TrustZone Extension in a Heterogeneous SoC
    Benhani, El Mehdi
    Marchand, Cedric
    Aubert, Alain
    Bossuet, Lilian
    [J]. 2017 30TH IEEE INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2017, : 108 - 113
  • [3] The Security of ARM TrustZone in a FPGA-Based SoC
    Benhani, E. M.
    Bossuet, L.
    Aubert, A.
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (08) : 1238 - 1248
  • [4] On the Integration of Physically Unclonable Functions into ARM TrustZone Security Technology
    Aitchison, Callum
    Buckle, Roman
    Ch'ng, Alvin
    Clarke, Christian
    Malley, Jacob
    Halak, Basel
    [J]. 24TH IEEE EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN (ECCTD 2020), 2020,
  • [5] TrustZone-based Mobile Terminal Security System
    Xiao, Jian
    Yang, Zhi
    Hu, Xiaochuan
    Liu, Yunhao
    Li, Dong
    [J]. 2018 CHINESE AUTOMATION CONGRESS (CAC), 2018, : 3981 - 3985
  • [6] SeCloak: ARM Trustzone-based Mobile Peripheral Control
    Lentz, Matthew
    Sen, Rijurekha
    Druschel, Peter
    Bhattacharjee, Bobby
    [J]. MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2018, : 1 - 13
  • [7] RESEARCH ON ARM TRUSTZONE
    Li, Wenhao
    Xia, Yubin
    Chen, Haibo
    [J]. GETMOBILE-MOBILE COMPUTING & COMMUNICATIONS REVIEW, 2018, 22 (03) : 17 - 22
  • [8] Architectures for Security: A comparative analysis of hardware security features in Intel SGX and ARM TrustZone
    Mukhtar, Muhammad Asim
    Bhatti, Muhammad Khurram
    Gogniat, Guy
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2019, : 299 - 304
  • [9] Reconciling Security with Virtualization: A Dual-Hypervisor Design for ARM TrustZone
    Cicero, Giorgiomaria
    Biondi, Alessandro
    Buttazzo, Giorgio
    Patel, Anup
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2018, : 1628 - 1633
  • [10] Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions
    Duarte, Nuno O.
    Yalew, Sileshi Demesie
    Santos, Nuno
    Correia, Miguel
    [J]. PROCEEDINGS OF THE 15TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2018), 2018, : 302 - 311