Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy 2019
DOI: 10.1145/3292006.3300035
|View full text |Cite
|
Sign up to set email alerts
|

TruZ-View

Abstract: When OS and hypervisor are compromised, mobile devices currently provide a hardware protected mode called Trusted Execution Environment (TEE) to guarantee the confidentiality and integrity of the User Interface (UI). The present TEE UI solutions adopt a self-contained design model, which provides a fully functional UI stack in the TEE, but they fail to manage one critical design principle of TEE: a small Trusted Computing Base (TCB), which should be more easily verified in comparison to a rich OS. The TCB size… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…For denial of service, although our threat model considers it out of scope as described in Section 2, we can still provide a notification mechanism that turns on an LED light to indicate that the secure world is displaying confidential images. Although we do not implement it in Rushmore, previous systems [33,68] do and show that it can be a functional solution.…”
Section: Security Analysismentioning
confidence: 94%
See 4 more Smart Citations
“…For denial of service, although our threat model considers it out of scope as described in Section 2, we can still provide a notification mechanism that turns on an LED light to indicate that the secure world is displaying confidential images. Although we do not implement it in Rushmore, previous systems [33,68] do and show that it can be a functional solution.…”
Section: Security Analysismentioning
confidence: 94%
“…In other words, the normal world and the secure world use two separate display channels-the frame buffer (used by the normal world) and the overlay buffer (used by the secure world). Therefore, Rushmore does not need to make a pixel-wise copy of the normal world's content to display it unlike a technique used by previous systems [33,68].…”
Section: Rushmore Usage Modelmentioning
confidence: 99%
See 3 more Smart Citations