2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks 2015
DOI: 10.1109/dsn.2015.11
|View full text |Cite
|
Sign up to set email alerts
|

TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
54
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 66 publications
(55 citation statements)
references
References 17 publications
0
54
0
1
Order By: Relevance
“…Intel VT-x/AMD-v based [49] Intel TXT/AMD SVM based [50] Intel SGX based [20] System Management Mode (SMM) based [51] Coprocessor based [52], [53] TrustZone based [54] SoC-bound Execution…”
Section: Hardware-assisted Executionmentioning
confidence: 99%
See 2 more Smart Citations
“…Intel VT-x/AMD-v based [49] Intel TXT/AMD SVM based [50] Intel SGX based [20] System Management Mode (SMM) based [51] Coprocessor based [52], [53] TrustZone based [54] SoC-bound Execution…”
Section: Hardware-assisted Executionmentioning
confidence: 99%
“…To protect the wide spread of software vulnerabilities in applications and operating systems, hardware-assisted isolation has been widely adopted in both x86 and ARM processors [50], [51], [20], [15], [54]. On the other hand, physical memory disclosure attacks [16], [17] achieve complete memory exposure through a different attack vector.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…SecReT (Jang et al 2015) mainly solves the establishment of secure communication between the Rich Execution Environment (REE) and Trust Execution Environment (TEE). ICE (Sun et al 2015b) runs the secure code in the non-secure domain by designing isolated secure environment to restrict the code size of TEE environment.…”
Section: Related Workmentioning
confidence: 99%
“…That is mainly to keep the TCB inside the secure world as small as possible. In TrustICE [50], the authors ensure isolation of a secure code in the normal world, called by the authors as isolated computing environment (ICE), through using a trusted domain controller (TDC) that resides in the secure world. To establish an ICE, a request is sent from the normal world and handled by the TDC, which in turn saves the status of the executing software (the Rich OS), configures the registers to prevent handling interrupts and after verifying the code integrity of the ICE saves it in a secure memory.…”
Section: Related Workmentioning
confidence: 99%