2015
DOI: 10.1007/978-3-319-27179-8_1
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Trusted Application Execution on Embedded Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…The need for privacy imposes cryptography utilization in applications that manage these sensitive data [12]. To this end developers embed cryptographic techniques in their mobile applications; and while cryptography is a long existing field, developers rarely have knowledge of information security.…”
Section: Introductionmentioning
confidence: 99%
“…The need for privacy imposes cryptography utilization in applications that manage these sensitive data [12]. To this end developers embed cryptographic techniques in their mobile applications; and while cryptography is a long existing field, developers rarely have knowledge of information security.…”
Section: Introductionmentioning
confidence: 99%
“…Secure and Trusted Application Execution on Embedded Devices [33] 2015 Holistic approach to the security and trust of embedded devices A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment [34] 2016…”
Section: General Resultsmentioning
confidence: 99%
“…Content may change prior to final publication. Protection for legacy applications [8] Access control between trusted and untrusted worlds [23] Protection for embedded devices [33] Hardware isolation architecture [41] Protection for applications execution [34] General-purpose trusted computing platform [27] Protection for real-time OS [43] Trusted OS [29] Protection against data leakage [70] Memory dump mechanism [30] Protection for memory integrity [45] Cache-assisted secure execution [39] Protection for legacy applications [48] Runtime security architecture [19] Protection for services [72] Kernel protection mechanism [51] Protection for SoC communication bus [66] TCB measurements management [42] Trusted I/O [74] Hypervisor [57] Secure device access method [26] Secure mobile device framework [54] TABLE 10. Application solution proposals…”
Section: Tee Advantages and Disadvantagesmentioning
confidence: 99%
“…With the aid of specific smart devices, smart home applications and services offer living convenience with consideration of the homeowner's living pattern, living style, and various other preferences. In other words, a homeowner can control and monitor areas of their home with the use of a smartphone [9][10][11]. As such, the intelligence and versatility of a smart home service make it possible for users to manage their houses regardless of where they are and what they are doing, through the use of a smartphone.…”
Section: Introductionmentioning
confidence: 99%
“…However, although the system is convenient and efficient, it can be vulnerable and open to security threats. Unlike smartphones, which have a decent level of security technology due to their various uses (such as business communications, family phone calls, text messaging, and internet surfing), smart home appliances have weak security technology so they are exposed to various attacks [11][12][13].…”
Section: Introductionmentioning
confidence: 99%