Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection

Cited 4 time in webofscience Cited 3 time in scopus
  • Hit : 466
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorJang, Jinsooko
dc.contributor.authorKang, Brent Byunghoonko
dc.date.accessioned2020-09-18T03:57:52Z-
dc.date.available2020-09-18T03:57:52Z-
dc.date.created2020-09-14-
dc.date.created2020-09-14-
dc.date.created2020-09-14-
dc.date.created2020-09-14-
dc.date.issued2018-05-
dc.identifier.citationIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.17, no.5, pp.1000 - 1014-
dc.identifier.issn1545-5971-
dc.identifier.urihttp://hdl.handle.net/10203/276065-
dc.description.abstractARM TrustZone provides a Trusted Execution Environment (TEE) to isolate security-critical services, which are generally invoked from the Rich Execution Environment (REE) through a communication channel established by executing the Secure Monitor Call (SMC) with the general registers configured as input parameters. Unfortunately, the communication channel has been abused by adversaries to incur misbehavior of the TEE, to analyze the internal working of the TEE, and to exploit its vulnerabilities. We therefore propose the TEE defense (TFence) framework that enables the creation of a partially privileged (par-priv) process, which benefits from the coordination of the system mode and virtualization extension. More specifically, on ARM architecture, direct invocation of hypercall and SMC is not allowed in the user process; however, we limitedly escalate the privilege of the process to enable it to directly communicate with trust anchors such as hypervisor and TrustZone. This approach enabled us to remove the kernel dependency when the process communicates with the TEE, which also reduces the attack surface to the critical part of the application involved in the communication. Besides, direct communication with the hypervisor facilitates the adoption of application-shielding approaches to protect the critical part and to restrict arbitrary access to the TEE.-
dc.languageEnglish-
dc.publisherIEEE COMPUTER SOC-
dc.titleRetrofitting the Partially Privileged Mode for TEE Communication Channel Protection-
dc.typeArticle-
dc.identifier.wosid000562075400008-
dc.identifier.scopusid2-s2.0-85047599107-
dc.type.rimsART-
dc.citation.volume17-
dc.citation.issue5-
dc.citation.beginningpage1000-
dc.citation.endingpage1014-
dc.citation.publicationnameIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING-
dc.identifier.doi10.1109/TDSC.2018.2840709-
dc.contributor.localauthorKang, Brent Byunghoon-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorKernel-
dc.subject.keywordAuthorCommunication channels-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorMonitoring-
dc.subject.keywordAuthorRegisters-
dc.subject.keywordAuthorVirtual machine monitors-
dc.subject.keywordAuthorComputer architecture-
dc.subject.keywordAuthorMobile device security-
dc.subject.keywordAuthortrusted execution environment (TEE)-
dc.subject.keywordAuthorARM TrustZone-
dc.subject.keywordAuthorcommunication channel security-
dc.subject.keywordPlusSECURE-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 4 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0