Secure and Trusted Application Execution on Embedded Devices

被引:4
|
作者
Markantonakis, Konstantinos [1 ]
Akram, Raja Naeem [1 ]
Msgna, Mehari G. [1 ]
机构
[1] Univ London, Smart Card Ctr, Informat Secur Grp, Royal Holloway, Egham, Surrey, England
关键词
Smart cards; Fault attacks; Runtime attacks; Hardware security; Runtime security; Trusted platform; Trusted execution; Trojans; Counterfeit products;
D O I
10.1007/978-3-319-27179-8_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded devices have permeated into our daily lives and significant day-to-day mundane tasks involve a number of embedded systems. These include smart cards, sensors in vehicles and industrial automation systems. Satisfying the requirements for trusted, reliable and secure embedded devices is more vital than ever before. This urgency is also strengthened further by the potential advent of the Internet of Things and Cyber-Physical Systems. As our reliance on these devices is increasing, the significance of potential threats should not be underestimated, especially as a number of embedded devices are built to operate in malicious environments, where they might be in the possession of an attacker. The challenge to build secure and trusted embedded devices is paramount. In this paper, we examine the security threats to embedded devices along with the associated prevention mechanisms. We also present a holistic approach to the security and trust of embedded devices, from the hardware design, reliability and trust of the runtime environment to the integrity and trustworthiness of the executing applications. The proposed protection mechanisms provide a high degree of security at a minimal computational cost. Such an agnostic view on the security and trust of the embedded devices can be pivotal in their adoption and trust acquisition from the general public and service providers.
引用
收藏
页码:3 / 24
页数:22
相关论文
共 50 条
  • [1] Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices
    Lee, Robert P.
    Markantonakis, Konstantinos
    Akram, Raja Naeem
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (03)
  • [2] Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures
    Bognar, Marton
    Van Bulck, Jo
    Piessens, Frank
    [J]. 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1638 - 1655
  • [3] Trusted Execution of Periodic Tasks for Embedded Systems
    Gunnarsson, Martin
    Vreman, Nils
    Maggio, Martina
    [J]. IFAC PAPERSONLINE, 2023, 56 (02): : 8845 - 8850
  • [4] Secure Managed Application and Execution Platform Technology for Smart Devices
    Ito, Hidenobu
    Nimura, Kazuaki
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2014, 50 (01): : 46 - 51
  • [5] PumpChannel: An Efficient and Secure Communication Channel for Trusted Execution Environment on ARM-FPGA Embedded SoC
    Ge, Jingquan
    Li, Yuekang
    Liu, Yang
    Zheng, Yaowen
    Liu, Yi
    Zhao, Lida
    [J]. 2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [6] SeRoT: A Secure Runtime System on Trusted Execution Environments
    Liu, Jingbin
    Qin, Yu
    Feng, Dengguo
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 30 - 37
  • [7] SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
    Jang, Jinsoo
    Kong, Sunjune
    Kim, Minsu
    Kim, Daegyeong
    Kang, Brent Byunghoon
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [8] HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment
    Gangal, Akshay
    Ye, Mengmei
    Wei, Sheng
    [J]. PROCEEDINGS OF THE 2020 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2020,
  • [9] Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments
    Shepherd, Carlton
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [10] Identification of trusted IoT devices for secure delegation
    Khalil, Ushna
    Ahmad, Adnan
    Abdel-Aty, Abdel-Haleem
    Elhoseny, Mohamed
    Abo El-Soud, Mohamed W.
    Zeshan, Furkh
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 90