Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2976749.2989052acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster
Public Access

POSTER: DroidShield: Protecting User Applications from Normal World Access

Published: 24 October 2016 Publication History

Abstract

Smartphones are becoming the main data sharing and storage devices in both our personal and professional lives, as companies now allow employees to share the same device for both purposes, provided the company's confidential information can be protected. However, as history has shown, systems relying on security policies or rules to protect user data are not airtight. Any flaw in the constructed rules or in the code of privileged applications can lead to complete compromise. In addition, we can not rely only on TrustZone[6] world separation to isolate confidential data from unauthorized access, because in addition to severe limitations in terms of both communication and memory space, there is a very low limit on the number of applications that can be installed in the secure world before we can start questioning its security, especially when considering code originating from multiple sources. Thus, the solutions currently available for TrustZone devices are not perfect and the data confidentiality can not be guaranteed. We propose an alternative approach, which involves providing the majority of secure world application advantages to a set of normal world applications, with almost none of the drawbacks by relying only on the TrustZone world separation and the TZ-RKP[2] kernel protection scheme.

References

[1]
ARM. Bulding a secure system using trustzone technology. ARM Technical White Paper, 2009.
[2]
A. M. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen. Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 90--102, 2014.
[3]
CVE-2016--2431. Online at https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016--2431.
[4]
M. Gulati, M. J. Smith, and S.-Y. Yu. Security enclave processor for a system on a chip. U.S Patent No. 8,832,465, September 2014.
[5]
U. Kanonov and A. Wool. Secure containers in android: the samsung knox case study. arXiv preprint arXiv:1605.08567, 2016.
[6]
SAMSUNG. Whitepaper: An overview of the samsung knox platform. November 2015.
[7]
S. Smalley and R. Craig. Security enhanced (se) android: Bringing flexible mac to android. NDSS, 310:20--38, 2013.
[8]
J. J. Soo, S. Kong, M. Kim, D. Kim, and B. B. Kang. Secret: Secure channel between rich execution environment and trusted execution environment. NDSS, February 2015.

Cited By

View all
  • (2023)Lark: Verified Cross-Domain Access Control for Trusted Execution Environments2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE)10.1109/ISSRE59848.2023.00031(160-171)Online publication date: 9-Oct-2023
  • (2022)Is your access allowed or not? A Verified Tag-based Access Control Framework for the Multi-domain TEEProceedings of the 13th Asia-Pacific Symposium on Internetware10.1145/3545258.3545281(252-261)Online publication date: 11-Jun-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
October 2016
1924 pages
ISBN:9781450341394
DOI:10.1145/2976749
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 October 2016

Check for updates

Author Tags

  1. arm trustzone
  2. data protection
  3. mobile device security
  4. secure execution

Qualifiers

  • Poster

Funding Sources

Conference

CCS'16
Sponsor:

Acceptance Rates

CCS '16 Paper Acceptance Rate 137 of 831 submissions, 16%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)49
  • Downloads (Last 6 weeks)12
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Lark: Verified Cross-Domain Access Control for Trusted Execution Environments2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE)10.1109/ISSRE59848.2023.00031(160-171)Online publication date: 9-Oct-2023
  • (2022)Is your access allowed or not? A Verified Tag-based Access Control Framework for the Multi-domain TEEProceedings of the 13th Asia-Pacific Symposium on Internetware10.1145/3545258.3545281(252-261)Online publication date: 11-Jun-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media