2022
DOI: 10.1109/access.2022.3152781
|View full text |Cite
|
Sign up to set email alerts
|

uTango: An Open-Source TEE for IoT Devices

Abstract: Security is one of the main challenges of the Internet of Things (IoT). IoT devices are mainly powered by low-cost microcontrollers (MCUs) that typically lack basic hardware security mechanisms to separate security-critical applications from less critical components. Recently, Arm has started to release Cortex-M MCUs enhanced with TrustZone technology (i.e., TrustZone-M), a system-wide security solution aiming at providing robust protection for IoT devices. Trusted Execution Environments (TEEs) relying on Trus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 47 publications
0
6
0
Order By: Relevance
“…Yet reward systems based on such simplified assumptions may not be applicable in any real-world scenario as the dominant strategy for an individual-rational agent is dishonest behavior (e.g., reporting the best possible outcome without costly model training). Recent technologies, such as TEE and ZK-SNARKs are promising for trusted computation on mobile, edge, and IoT devices [110]. However, how to leverage them to achieve honest reports without incurring additional costs (e.g., computational costs) is an open question.…”
Section: B Functionalitiesmentioning
confidence: 99%
“…Yet reward systems based on such simplified assumptions may not be applicable in any real-world scenario as the dominant strategy for an individual-rational agent is dishonest behavior (e.g., reporting the best possible outcome without costly model training). Recent technologies, such as TEE and ZK-SNARKs are promising for trusted computation on mobile, edge, and IoT devices [110]. However, how to leverage them to achieve honest reports without incurring additional costs (e.g., computational costs) is an open question.…”
Section: B Functionalitiesmentioning
confidence: 99%
“…Integrating attack-resistant design principles into BioMEMS architecture fortifies their resilience against various attack vectors. Implementing hardware-based security modules, such as Trusted Platform Modules (TPM) [22] ,Trusted Execution Environments (TEEs) [23] or SGX enclaves [24], can shield critical operations and sensitive data from external tampering. Solutions like uTango [23] serve as evidence of the effectiveness of hardware-based isolation mechanisms in mitigating the potential impact of security breaches.…”
Section: Mitigating Security Risks In Biomems For Enhanced Iot Commun...mentioning
confidence: 99%
“…In our design, we use an ARM Cortex-M23 series processor [44] using TrustZone-M, which has been widely used in IoT devices [45] and is currently listed as a small and energy-efficient processor suitable for wearable devices. Data owners' activities are processed within the TEE, and the data are attested using the TEE's private key ρ = SIG(data,pk tee ) where SIG is the signing function and ρ is the attestation.…”
Section: Verification Of Data Recordsmentioning
confidence: 99%