Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1655108.1655111acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Trust in a small package: minimized MRTM software implementation for mobile secure environments

Published: 13 November 2009 Publication History

Abstract

In this paper we present a software-based implementation of a Mobile Remote Owner Trusted Module, using security extensions of contemporary System-On-Chip architectures. An explicit challenge are the constrained resources of such on-chip mechanisms. We expose a software architecture that minimizes the code and data size of the MRTM, applying some novel approaches proposed in recent research. Additionally, we explore alternatives within the specification to further optimize the size of MTMs. We present an analysis of specific new security issues induced by the architecture. Performance figures for an on-the-market mobile handset are provided. The results clearly indicate that a software-based MRTM is feasible on modern embedded hardware with legacy security environments.

References

[1]
Embedded XEN. http://sourceforge.net/projects/embeddedxen/.
[2]
Keylength.com -- Cryptographic Key Length Recommendation, http://www.keylength.com.
[3]
XEN Hypervisor. http://xen.org/.
[4]
ARM. TrustZone-enabled processor. http://www.arm.com/pdfs/DDI0301D_arm1176jzfs_r0p2_trm.pdf.
[5]
Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn. vTPM: virtualizing the trusted platform module. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, Berkeley, CA, USA, 2006. USENIX Association.
[6]
Kurt Dietrich. An integrated architecture for trusted computing for java enabled embedded devices. In STC'07: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 2--6, New York, NY, USA, 2007. ACM.
[7]
Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, and Marko Wolf. Reconfigurable trusted computing in hardware. In STC'07: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 15--20, New York, NY, USA, 2007. ACM.
[8]
Jan-Erik Ekberg and Markku Kylänpää. Mobile Trusted Module (MTM) -an introduction. http://research.nokia.com/files/NRCTR2007015.pdf.
[9]
Jan-Erik Ekberg and Markku Kylänpää. MTM implementation on the TPM emulator. http://mtm.nrsec.com/.
[10]
Joo-Young Hwang, Sang-Bum Suh, Sung-Kwan Heo, Chan-Ju Park, Jae-Min Ryu, Seong-Yeol Park, and Chul-Ryun Kim. Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones. In Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE, pages 257--261, January 2008.
[11]
Klaus Kursawe and Dries Schellekens. Flexible μTPMs through disembedding. In ASIACCS'09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pages 116--124, New York, NY, USA, 2009. ACM.
[12]
Dries Schellekens, Pim Tuyls, and Bart Preneel. Embedded Trusted Computing with Authenticated Non-volatile Memory. In Trust '08: Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies, pages 60--74, Berlin, Heidelberg, 2008. Springer--Verlag.
[13]
Andreas U. Schmidt, Nicolai Kuntze, and Michael Kasper. On the deployment of Mobile Trusted Modules, 2007.
[14]
Jay Srage and Jerome Azema. M-Shield Mobile Security Technology, 2005. TI White paper. http://focus.ti.com/pdfs/wtbu/ti_mshield_whitepaper.pdf.
[15]
Mario Strasser and Heiko Stamer. A Software-Based Trusted Platform Module Emulator. In Trust '08: Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies, pages 33--47, Berlin, Heidelberg, 2008. Springer-Verlag.
[16]
Harini Sundaresan. OMAP platform security features, July 2003. TI White paper. http://focus.ti.com/pdfs/vf/wireless/platformsecuritywp.pdf.
[17]
Trusted Computing Group. Mobile Trusted Module (MTM) Specification. Version 1.0 Revision 6, 26 June 2008, http://www.trustedcomputinggroup.org/resources/mobile_phone_work_group_%mobile_trusted_module_specification_version_10.
[18]
Trusted Computing Group. TCG Mobile Reference Architecture Specification. Version 1.0 Revision 1, 12 June 2007 http://www.trustedcomputinggroup.org/resources/mobile_phone_work_group_%mobile_reference_architecture.
[19]
Trusted Computing Group. TCG Software Stack (TSS). Specification Version 1.2 Level 1 Errata A, 7 March 2007, http://www.trustedcomputinggroup.org/resources/tcg_software_stack_tss_s%pecification.
[20]
Trusted Computing Group. Trusted Platform Module (TPM) Main Specification. Version 1.2 Revision 103, 9 July 2007, http://www.trustedcomputinggroup.org/resources/tpm_main_specification.
[21]
Johannes Winter. Trusted computing building blocks for embedded linux-based ARM trustzone platforms. In STC'08: Proceedings of the 3rd ACM workshop on Scalable trusted computing, pages 21--30, New York, NY, USA, 2008. ACM.
[22]
Xinwen Zhang, Onur Acıiçmez, and Jean-Pierre Seifert. A trusted mobile phone reference architecturevia secure kernel. In STC'07: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 7--14, New York, NY, USA, 2007. ACM.

Cited By

View all

Index Terms

  1. Trust in a small package: minimized MRTM software implementation for mobile secure environments

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      STC '09: Proceedings of the 2009 ACM workshop on Scalable trusted computing
      November 2009
      82 pages
      ISBN:9781605587882
      DOI:10.1145/1655108
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 13 November 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. mobile phones
      2. mobile trusted module
      3. platform security
      4. secure hardware
      5. trusted computing

      Qualifiers

      • Research-article

      Conference

      CCS '09
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 17 of 31 submissions, 55%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 25 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)simTPMProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361376(533-550)Online publication date: 14-Aug-2019
      • (2018)Using mobile phones to enhance computing platform trustTelecommunications Systems10.1007/s11235-018-0456-y69:2(187-205)Online publication date: 1-Oct-2018
      • (2018)Using trusted computing for privacy preserving keystroke-based authentication in smartphonesTelecommunications Systems10.1007/s11235-011-9538-952:4(2149-2161)Online publication date: 30-Dec-2018
      • (2018)TSSDroidSecurity and Communication Networks10.1002/sec.14489:11(1553-1576)Online publication date: 20-Dec-2018
      • (2014)Trust-EProceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)10.1109/UIC-ATC-ScalCom.2014.15(495-501)Online publication date: 9-Dec-2014
      • (2012)Exploring Touch-Screen Biometrics for User Identification on Smart PhonesPrivacy and Identity Management for Life10.1007/978-3-642-31668-5_10(130-143)Online publication date: 2012
      • (2011)Practical and lightweight domain isolation on AndroidProceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices10.1145/2046614.2046624(51-62)Online publication date: 17-Oct-2011
      • (2011)Dependable TCB Based on the Cell Broadband Engine Isolation FacilityProceedings of the 2011 IEEE17th International Conference on Embedded and Real-Time Computing Systems and Applications - Volume 0110.1109/RTCSA.2011.45(360-370)Online publication date: 28-Aug-2011
      • (2011)A flexible software development and emulation framework for ARM trustzoneProceedings of the Third international conference on Trusted Systems10.1007/978-3-642-32298-3_1(1-15)Online publication date: 27-Nov-2011
      • (2010)µTSSProceedings of the 3rd international conference on Trust and trustworthy computing10.5555/1875652.1875662(124-140)Online publication date: 21-Jun-2010
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media