2017
DOI: 10.23919/tst.2017.8030534
|View full text |Cite
|
Sign up to set email alerts
|

A trustenclave-based architecture for ensuring run-time security in embedded terminals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Framework for development of trusted IoT applications C-FLAT: Control-Flow Attestation for Embedded Systems Software [37] 2016 Attestation for the application execution path without requiring the source code Remote Attestation for Embedded Systems [38] 2016 Implementation of Trusted Platform Module (TPM) with ARM processor CaSE: Cache-Assisted Secure Execution on ARM Processors [39] 2016 Cache-assisted protection against multi-vector attacks and memory disclosure A trust enclave-based architecture for ensuring run-time security in embedded terminals [19] 2017…”
Section: General Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Framework for development of trusted IoT applications C-FLAT: Control-Flow Attestation for Embedded Systems Software [37] 2016 Attestation for the application execution path without requiring the source code Remote Attestation for Embedded Systems [38] 2016 Implementation of Trusted Platform Module (TPM) with ARM processor CaSE: Cache-Assisted Secure Execution on ARM Processors [39] 2016 Cache-assisted protection against multi-vector attacks and memory disclosure A trust enclave-based architecture for ensuring run-time security in embedded terminals [19] 2017…”
Section: General Resultsmentioning
confidence: 99%
“…Content may change prior to final publication. Protection for legacy applications [8] Access control between trusted and untrusted worlds [23] Protection for embedded devices [33] Hardware isolation architecture [41] Protection for applications execution [34] General-purpose trusted computing platform [27] Protection for real-time OS [43] Trusted OS [29] Protection against data leakage [70] Memory dump mechanism [30] Protection for memory integrity [45] Cache-assisted secure execution [39] Protection for legacy applications [48] Runtime security architecture [19] Protection for services [72] Kernel protection mechanism [51] Protection for SoC communication bus [66] TCB measurements management [42] Trusted I/O [74] Hypervisor [57] Secure device access method [26] Secure mobile device framework [54] TABLE 10. Application solution proposals…”
Section: Tee Advantages and Disadvantagesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, all these are reactive countermeasures and they cannot deal with next‐generation unknown threats. Trusted computing has been proposed to harden cybersecurity defence of embedded terminal for industrial applications [10]. Since only the authorised software can operate, it enforces specific behaviours and protects the system against unauthorised changes and attacks such as malware and root kits.…”
Section: Introductionmentioning
confidence: 99%
“…Enclave’s security boundary contains only the CPU and itself. In theory, SGX can be widely used in many ways [ 25 , 26 ]; a significant usage is to prevent the compromised OS from attacking the software.…”
Section: Introductionmentioning
confidence: 99%