Trusted Execution Environments are quickly becoming a preferred method for providing isolation between secure and non-secure execution environments.
These keys can also be used to manage modification of the TEE during execution. In this paper, we present an new methodology for how this protection can be ...
[PDF] Securing Trusted Execution Environments with PUF Generated ...
ece-research.unm.edu › MattPaper
To address these concerns, we propose the incorporation of a PUF inside the crypto-engine of modern SoC devices. By using a PUF to generate a secret AES key, we ...
Trusted Execution Environments are quickly becoming a preferred method for providing isolation between secure and non-secure execution environments.
Dec 3, 2012 · In addition to securing the TEE while on disk, the PUFgenerated key will be used to encrypt a measurement ofthe TEE that will also be stored on ...
Title: Securing Trusted Execution Environments with PUF Generated Secret Keys. Conference · Tue May 01 00:00:00 EDT 2012. OSTI ID:1117385.
The PUF on the main device performs an RoT and generates a device-specific key securely. To secure sensor data between the enclave and the host server (i.e. the ...
People also ask
What is the difference between secure enclave and trusted execution environment?
What are trusted execution environments used for?
While secure storage solutions like the Trusted Platform Module (TPM) provide strong protection for secret keys, making PUFs potentially unnecessary for devices ...
The principle is similar to the certificate method: for each device which needs authentication, a secret key is generated and embedded in the device in a secure ...
Designing secure PUF-based authentication protocols for ... - NCBI
www.ncbi.nlm.nih.gov › PMC10709365
Dec 7, 2023 · PUFs are hardware-based primitives that generate a unique and unpredictable response to a challenge, which can serve as a secret key for ...