Proceedings of 5th Asia-Pacific Workshop on Systems 2014
DOI: 10.1145/2637166.2637225
|View full text |Cite
|
Sign up to set email alerts
|

Building trusted path on untrusted device drivers for mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
22
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
5

Relationship

2
8

Authors

Journals

citations
Cited by 59 publications
(23 citation statements)
references
References 8 publications
1
22
0
Order By: Relevance
“…It allows a human user to directly interact with applications running inside TEE. Examples of trusted userinterface can be found in [33]- [35].…”
Section: Tee Building Blocksmentioning
confidence: 99%
“…It allows a human user to directly interact with applications running inside TEE. Examples of trusted userinterface can be found in [33]- [35].…”
Section: Tee Building Blocksmentioning
confidence: 99%
“…Prior work has built trusted path using TrustZone, with much focus on balancing the size of the secure TCB versus functionality. For instance, TrustUI [34] enables trusted paths without trusting device drivers by splitting drivers into an untrusted backend and trusted frontend that runs within the secure kernel. TrustUI uses ad-hoc techniques, such as randomizing keys on the on-screen keyboard after every touch, for ensuring that the information available to the non-secure kernel does not leak device data.…”
Section: Background and Related Workmentioning
confidence: 99%
“…SIMlets [35] splits the bill for mobile data using TrustZone and allows content providers to pay for the traffic generated by mobile users visiting their websites or using their services. TrustUI [25] uses TrustZone to provde trusted paths between mobile user and mobile device as well as between mobile device and remote service without trusting the device drivers.…”
Section: Related Workmentioning
confidence: 99%