Investigating TrustZone: A Comprehensive Analysis
نویسندگان
چکیده
The advent of the Internet and portable devices, including smartphones watches, has brought unprecedented opportunities for embedded application systems developments. Along with these developments, there is an increasing need devices to handle important services, such as ability pay bills or manage bank accounts remotely via mobile phones. Such applications developments have also highlighted issues cyberattacks computing network security--these made phones a potential target malware, trojans, viruses, so it critical design set security technologies devices. In fact, become essential requirement in process system design. Thus, ARM proposed system-level solutions based on TrustZone technology. technology tightly integrated Cortex™-A processors extends through AMBA® AXI bus specific IP blocks protect peripherals secure memory, encryption blocks, keyboards, screens from software attacks. It divides into TEE (Trusted Execution Environment) REE (Rich by hardware provides intrinsic services interfaces. More precisely, built combining software. worth noting that does not influence performance, power consumption, area much possible. Owing characteristics, gained wide attention researchers worldwide. There lack systematic documentation Therefore, this paper documents significant progress achieved field. particular, article mainly analyses primary mechanism implementation, how build Trusted Environment different environments. Then, discusses related research works academic field business Furthermore, advantages weaknesses well possible aiming at deficiency are outlined. Finally, comparison another mainstream commercial SGX, future directions presented.
منابع مشابه
LTZVisor: TrustZone is the Key
Virtualization technology starts becoming more and more widespread in the embedded systems arena, driven by the upward trend for integrating multiple environments into the same hardware platform. The penalties incurred by standard software-based virtualization, altogether with the strict timing requirements imposed by real-time virtualization are pushing research towards hardware-assisted solut...
متن کاملDowngrade Attack on TrustZone
Security-critical tasks require proper isolation from untrusted software. Chip manufacturers design and include trusted execution environments (TEEs) in their processors to secure these tasks. The integrity and security of the software in the trusted environment depend on the verification process of the system. We find a form of attack that can be performed on the current implementations of the...
متن کاملvTZ: Virtualizing ARM TrustZone
ARM TrustZone, a security extension that provides a secure world, a trusted execution environment (TEE), to run security-sensitive code, has been widely adopted in mobile platforms. With the increasing momentum of ARM64 being adopted in server markets like cloud, it is likely to see TrustZone being adopted as a key pillar for cloud security. Unfortunately, TrustZone is not designed to be virtua...
متن کاملTruSense: Information Leakage from TrustZone
With the emergence of Internet of Things, mobile devices are generating more network traffic than ever. TrustZone is a hardware-enabled trusted execution environment for ARM processors. While TrustZone is effective in providing the muchneeded memory isolation, we observe that it is possible to derive secret information from secure world using the cache contention, due to its high-performance ca...
متن کاملA Comprehensive Performance Analysis of Direct Detection Receivers inWDMASystems
In this work the performance of a wavelength division multiple access (WDMA) system with direct detection receiver is investigated. For this purpose, the probability of error in a WDMA network with OOK modulation considering crosstalk, ISI, photo detector noise and thermal noise is calculated and the effect of each on system performance is investigated. The system performance in presence of PIN...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2023
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2023/7369634