Show simple item record

dc.contributor.authorYehuda, Raz Ben
dc.contributor.authorLeon, Roee
dc.contributor.authorZaidenberg, Nezer
dc.contributor.editorCruz, Tiago
dc.contributor.editorSimoes, Paulo
dc.date.accessioned2020-01-07T07:26:00Z
dc.date.available2020-01-07T07:26:00Z
dc.date.issued2019
dc.identifier.citationYehuda, R. B., Leon, R., & Zaidenberg, N. (2019). Arm security alternatives. In T. Cruz, & P. Simoes (Eds.), <i>ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security</i> (pp. 604-612). Academic Conferences International. Proceedings of the European conference on information warfare and security.
dc.identifier.otherCONVID_32290203
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/67099
dc.description.abstractMany real-world scenarios such as protecting DRM, online payments and usage in NFC payments in embedded devices require a trustworthy “trusted execution environment” (TEE) platform. The TEE should run on the ARM architecture. That is popular in embedded devices. Furthermore, past experience has proved that such TEE platform should be available in source code form. Without the source code 3rd parties and user cannot be conducted code review audit. Lack of review put doubt on the system as a trustworthy environment. The popular Android OS supports various TEE implementations. Each TEE OS implementation has its own unique way of deploying trusted applications(trustlets) and its own distinct features. Choosing a proper TEE operating system can be a problem for trust applications developers. When choosing TEE applications developers has many conflicting goals. The developers attempt to ensure that their apps work on as many different Android devices as possible. Furthermore, developers relay on the TEE for certain features and must ensure the suggested TEE provides all the features that they need. We survey multiple ARM TrustZone TEE operating systems that are commonly available and in use today. We wish to provide all the information for IoT vendors and SoC manufacturer to select a suitable TEE.en
dc.format.extent884
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European conference on information warfare and security
dc.rightsIn Copyright
dc.subject.othervirtualization
dc.subject.otherARM architecture
dc.subject.otherTrustZone
dc.subject.othertrusted computing
dc.titleArm security alternatives
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202001071040
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-912764-28-0
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange604-612
dc.relation.issn2048-8602
dc.type.versionpublishedVersion
dc.rights.copyright© The Author(s) 2019
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysoavoin lähdekoodi
dc.subject.ysovirtualisointi
dc.subject.ysokyberturvallisuus
dc.subject.ysoverkkomaksaminen
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p17089
jyx.subject.urihttp://www.yso.fi/onto/yso/p22009
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p28448
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright