2023
DOI: 10.1109/tdsc.2022.3216020
|View full text |Cite
|
Sign up to set email alerts
|

Smaug: A TEE-Assisted Secured SQLite for Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 37 publications
0
7
0
Order By: Relevance
“…Note that though SII is presented to the user, it runs in a secure OS, and an attacker cannot compromise it to obtain plaintext data. SELECT: In order to achieve secure data retrieval, a CA invokes the TA to generate and execute SELECT statements via sending predefined REE-side database operation commands (RDOC, proposed in Section IV-B of literature [5]). RDOCs are a set of commands composed of a few keywords and symbols, and each command is mapped to a specific SQL statement.…”
Section: Insertmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that though SII is presented to the user, it runs in a secure OS, and an attacker cannot compromise it to obtain plaintext data. SELECT: In order to achieve secure data retrieval, a CA invokes the TA to generate and execute SELECT statements via sending predefined REE-side database operation commands (RDOC, proposed in Section IV-B of literature [5]). RDOCs are a set of commands composed of a few keywords and symbols, and each command is mapped to a specific SQL statement.…”
Section: Insertmentioning
confidence: 99%
“…This will violate the system real-time requirements and even make the system unavailable. Moreover, in some recent work, Trusted Execution Environment (TEE) is also adopted to protect critical database components [5], [6], [7], [8], such as encryption proxy, from threats of system vulnerabilities and attackers. Unfortunately, due to the lack of specific design and optimizations, these TEEassisted schemes do not have high performance or usability in embedded systems.…”
Section: Introductionmentioning
confidence: 99%
“…Using the Hikey development board, they designed and implemented a prototype system to show how TrustZone can be incorporated with Android and used to secure SQLite data. Moreover, authors in [36] proposed Smaug, a secure scheme to ensure the confidentiality and integrity of SQLite databases in embedded systems. They used TrustZone-based TEE to target most embedded systems; while the use of TPM module is to add a solid root-of-trust (RoT) to the system.…”
Section: Related Workmentioning
confidence: 99%
“…Larger programs may cause higher memory consumption, leading to slower performance. It indicates that measuring the memory usage overhead of any developed system is essential to evaluate its overall performance [50], [36]. Figure 11 illustrates the memory consumption overhead of our parallel SQLite-XTS system.…”
Section: Measuring Memory Overheadmentioning
confidence: 99%
“…Recently, an attribute-based encryption method was proposed to support fine-grained access control of EDR data [10]. In addition, D. Lu et al proposed TEE-based SQLite for embedded systems [28]. The system utilizes TEE to encrypt sensitive data and safely perform sensitive operations by isolating them from unreliable environments.…”
Section: B Related Workmentioning
confidence: 99%