2014
DOI: 10.1109/msp.2014.38
|View full text |Cite
|
Sign up to set email alerts
|

The Untapped Potential of Trusted Execution Environments on Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
56
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 69 publications
(56 citation statements)
references
References 5 publications
0
56
0
Order By: Relevance
“…By using TEE, the ciphered stream and the keys are in the secure component and all the process is performed securely. This solution guarantees no data leaks [16].…”
Section: Fields Of Applicationmentioning
confidence: 99%
“…By using TEE, the ciphered stream and the keys are in the secure component and all the process is performed securely. This solution guarantees no data leaks [16].…”
Section: Fields Of Applicationmentioning
confidence: 99%
“…Secure boot is only supported by newer SBC's and it allows a measure of defence against some attacks by only permitting booting from code that has been signed by an authorised key [12], making it more difficult for attackers to introduce malicious code.…”
Section: Single Board Computer Selectionmentioning
confidence: 99%
“…Hardware-based TEEs have been widely deployed in mobile devices for over a decade [1]. TI M-Shield [2] and ARM TrustZone [3], [4] are early examples, followed by newer architectures like the Intel SEP security co-processor [5] and Apple's "Secure Enclave" co-processor [6].…”
Section: Introductionmentioning
confidence: 99%
“…TI M-Shield [2] and ARM TrustZone [3], [4] are early examples, followed by newer architectures like the Intel SEP security co-processor [5] and Apple's "Secure Enclave" co-processor [6]. Business requirements such as the need to enforce digital rights management and subsidy locks, as well as regulatory requirements like 1 https://open-tee.github.io cloning-and theft protection have been the driving forces behind such large scale deployment [1]. Such requirements continue to appear: e.g., fingerprint scanners with hardware protection, hardware-backed keystores, and the recent "kill switch" [7] bill in California mandating that a mobile device must be capable of being rendered inoperable if it is stolen.…”
Section: Introductionmentioning
confidence: 99%