A4 Article in conference proceedings
Arm security alternatives (2019)


Yehuda, R. B., Leon, R., & Zaidenberg, N. (2019). Arm security alternatives. In T. Cruz, & P. Simoes (Eds.), ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security (pp. 604-612). Academic Conferences International. Proceedings of the European conference on information warfare and security.


JYU authors or editors


Publication details

All authors or editorsYehuda, Raz Ben; Leon, Roee; Zaidenberg, Nezer

Parent publicationECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security

Parent publication editorsCruz, Tiago; Simoes, Paulo

Conference:

  • European Conference on Cyber Warfare and Security

Place and date of conferenceCoimbra, Portugal4.-5.6.2019

ISBN978-1-912764-28-0

Journal or seriesProceedings of the European conference on information warfare and security

ISSN2048-8602

eISSN2048-8610

Publication year2019

Pages range604-612

Number of pages in the book884

PublisherAcademic Conferences International

Publication countryUnited Kingdom

Publication languageEnglish

Publication open accessNot open

Publication channel open access

Publication is parallel published (JYX)https://jyx.jyu.fi/handle/123456789/67099


Abstract

Many real-world scenarios such as protecting DRM, online payments and usage in NFC payments in embedded devices require a trustworthy “trusted execution environment” (TEE) platform. The TEE should run on the ARM architecture. That is popular in embedded devices. Furthermore, past experience has proved that such TEE platform should be available in source code form. Without the source code 3rd parties and user cannot be conducted code review audit. Lack of review put doubt on the system as a trustworthy environment. The popular Android OS supports various TEE implementations. Each TEE OS implementation has its own unique way of deploying trusted applications(trustlets) and its own distinct features. Choosing a proper TEE operating system can be a problem for trust applications developers. When choosing TEE applications developers has many conflicting goals. The developers attempt to ensure that their apps work on as many different Android devices as possible. Furthermore, developers relay on the TEE for certain features and must ensure the suggested TEE provides all the features that they need. We survey multiple ARM TrustZone TEE operating systems that are commonly available and in use today. We wish to provide all the information for IoT vendors and SoC manufacturer to select a suitable TEE.


Keywordsvirtualisationpaying onlinecyber securityopen source code

Free keywordsvirtualization, ARM architecture, TrustZone, trusted computing


Contributing organizations


Ministry reportingYes

Reporting Year2019

JUFO rating1


Last updated on 2024-25-03 at 13:37