Skip to main content

2022 | OriginalPaper | Buchkapitel

Anonymous Trusted Data Relocation for TEEs

verfasst von : Vasco Guita, Daniel Andrade, João Nuno Silva, Miguel Correia

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Trusted Execution Environment (TEE) technology like ARM TrustZone allows protecting confidential data using cryptographic keys that are bound to a specific TEE and device. However, there are good reasons to allow relocating such data from a TEE to another TEE in another device, often in a non-interactive (offline) and anonymous manner. We propose the Trusted Relocation Extension (TRX), a TrustZone-based trusted storage service enabling backup/recovery and sharing of data between TEEs in different devices. TRX works offline, without previous key exchange, and ensures the anonymity of the sender and the receiver. We present an implementation of TRX compatible with OP-TEE and its evaluation with Raspberry Pi 3 B+ devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
Literatur
1.
Zurück zum Zitat Alder, F., et al.: Migrating SGX enclaves with persistent state. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 195–206 (2018) Alder, F., et al.: Migrating SGX enclaves with persistent state. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 195–206 (2018)
2.
Zurück zum Zitat ARM. ARM security technology: building a secure system using TrustZone technology (2009) ARM. ARM security technology: building a secure system using TrustZone technology (2009)
3.
Zurück zum Zitat ARM. Trusted board boot requirements client (TBBR-CLIENT) Armv8-A. Document number: ARM DEN0006D (2018) ARM. Trusted board boot requirements client (TBBR-CLIENT) Armv8-A. Document number: ARM DEN0006D (2018)
4.
Zurück zum Zitat ARM. TrustZone for Armv8-A. Version 1.0 (2020) ARM. TrustZone for Armv8-A. Version 1.0 (2020)
7.
Zurück zum Zitat Cai, Y., et al.: SuiT: secure user interface based on TrustZone. In: 2019 IEEE International Conference on Communications (ICC), pp. 1–7 (2019) Cai, Y., et al.: SuiT: secure user interface based on TrustZone. In: 2019 IEEE International Conference on Communications (ICC), pp. 1–7 (2019)
8.
Zurück zum Zitat Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef
9.
Zurück zum Zitat Chen, B., et al.: CL-ME: efficient certificateless matchmaking encryption for internet of things. IEEE Internet Things J. 8(19), 15010–15023 (2021)CrossRef Chen, B., et al.: CL-ME: efficient certificateless matchmaking encryption for internet of things. IEEE Internet Things J. 8(19), 15010–15023 (2021)CrossRef
10.
Zurück zum Zitat Costan, V., Devadas, S.: Intel SGX explained. IACR Cryptology ePrint Arch. 2016(086), 1–118 (2016) Costan, V., Devadas, S.: Intel SGX explained. IACR Cryptology ePrint Arch. 2016(086), 1–118 (2016)
11.
Zurück zum Zitat Costan, V., Lebedev, I., Devadas, S.: Sanctum: minimal hardware extensions for strong software isolation. In: 25th USENIX Security Symposium, pp. 857–874 (2016) Costan, V., Lebedev, I., Devadas, S.: Sanctum: minimal hardware extensions for strong software isolation. In: 25th USENIX Security Symposium, pp. 857–874 (2016)
12.
Zurück zum Zitat Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium (2004) Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium (2004)
13.
Zurück zum Zitat GlobalPlatform, Inc. Trusted user interface API version 1.0. Document Reference: GPD_SPE_020, June 2013 GlobalPlatform, Inc. Trusted user interface API version 1.0. Document Reference: GPD_SPE_020, June 2013
14.
Zurück zum Zitat GlobalPlatform, Inc. TEE internal core API specification version 1.1.2.50 (target v1.2). Document Reference: GPD_SPE_010, June 2018 GlobalPlatform, Inc. TEE internal core API specification version 1.1.2.50 (target v1.2). Document Reference: GPD_SPE_010, June 2018
15.
Zurück zum Zitat González, J., Bonnet, P.: TEE-based trusted storage. Technical report, IT University Technical Report Series (2014) González, J., Bonnet, P.: TEE-based trusted storage. Technical report, IT University Technical Report Series (2014)
16.
Zurück zum Zitat Gulcu, C., Tsudik, G.: Mixing E-mail with Babel. In: Proceedings of the Symposium on Network and Distributed Systems Security, pp. 2–16 (1996) Gulcu, C., Tsudik, G.: Mixing E-mail with Babel. In: Proceedings of the Symposium on Network and Distributed Systems Security, pp. 2–16 (1996)
17.
Zurück zum Zitat Huang, S., Liu, C., Su, Z.: Secure storage model based on TrustZone. In: IOP Conference Series: Materials Science and Engineering (2019) Huang, S., Liu, C., Su, Z.: Secure storage model based on TrustZone. In: IOP Conference Series: Materials Science and Engineering (2019)
18.
Zurück zum Zitat Intel. Attestation service for Intel software guard extensions: API documentation. Intel Corporation. Revision 6.0 (2020) Intel. Attestation service for Intel software guard extensions: API documentation. Intel Corporation. Revision 6.0 (2020)
19.
Zurück zum Zitat Lentz, M., et al.: SeCloak: ARM trustZone-based mobile peripheral control. In: Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services (2018) Lentz, M., et al.: SeCloak: ARM trustZone-based mobile peripheral control. In: Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services (2018)
20.
Zurück zum Zitat Lerman, L., Bontempi, G., Markowitch, O.: Side channel attack: an approach based on machine learning. Center for Advanced Security Research Darmstadt, pp. 29–41 (2011) Lerman, L., Bontempi, G., Markowitch, O.: Side channel attack: an approach based on machine learning. Center for Advanced Security Research Darmstadt, pp. 29–41 (2011)
21.
Zurück zum Zitat Li, W., et al.: Building trusted path on untrusted device drivers for mobile devices. In: Proceedings of 5th ACM Asia-Pacific Workshop on Systems (2014) Li, W., et al.: Building trusted path on untrusted device drivers for mobile devices. In: Proceedings of 5th ACM Asia-Pacific Workshop on Systems (2014)
22.
Zurück zum Zitat Liang, H., Zhang, Q., Li, M., Li, J.: Toward migration of SGX-enabled containers. In: 2019 IEEE Symposium on Computers and Communications, pp. 1–6 (2019) Liang, H., Zhang, Q., Li, M., Li, J.: Toward migration of SGX-enabled containers. In: 2019 IEEE Symposium on Computers and Communications, pp. 1–6 (2019)
24.
Zurück zum Zitat McKeen, F., et al.: Innovative instructions and software model for isolated execution. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, June 2013 McKeen, F., et al.: Innovative instructions and software model for isolated execution. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, June 2013
25.
Zurück zum Zitat Park, J., Park, S., Kang, B.B., Kim, K.: eMotion: an SGX extension for migrating enclaves. Comput. Secur. 80, 173–185 (2019)CrossRef Park, J., Park, S., Kang, B.B., Kim, K.: eMotion: an SGX extension for migrating enclaves. Comput. Secur. 80, 173–185 (2019)CrossRef
26.
Zurück zum Zitat Pinto, S., Santos, N.: Demystifying Arm TrustZone: a comprehensive survey. ACM Comput. Surv. 51(6), 130 (2019)CrossRef Pinto, S., Santos, N.: Demystifying Arm TrustZone: a comprehensive survey. ACM Comput. Surv. 51(6), 130 (2019)CrossRef
27.
Zurück zum Zitat Rogaway, P.: Authenticated-encryption with associated-data. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 98–107 (2002) Rogaway, P.: Authenticated-encryption with associated-data. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 98–107 (2002)
28.
Zurück zum Zitat Santos, N., Raj, H., Saroiu, S., Wolman, A.: Using ARM TrustZone to build a trusted language runtime for mobile applications. In: Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems (2014) Santos, N., Raj, H., Saroiu, S., Wolman, A.: Using ARM TrustZone to build a trusted language runtime for mobile applications. In: Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems (2014)
29.
Zurück zum Zitat Thurlow, R.: RPC: remote procedure call protocol specification version 2. RFC 5531, RFC Editor, May 2009 Thurlow, R.: RPC: remote procedure call protocol specification version 2. RFC 5531, RFC Editor, May 2009
32.
Zurück zum Zitat Xu, S., et al.: Match in my way: fine-grained bilateral access control for secure cloud-fog computing. IEEE Trans. Dependable Secure Comput. 19(2), 1064–1077 (2020) Xu, S., et al.: Match in my way: fine-grained bilateral access control for secure cloud-fog computing. IEEE Trans. Dependable Secure Comput. 19(2), 1064–1077 (2020)
33.
Zurück zum Zitat Xu, S., et al.: Expressive bilateral access control for internet-of-things in cloud-fog computing. In: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, pp. 143–154 (2021) Xu, S., et al.: Expressive bilateral access control for internet-of-things in cloud-fog computing. In: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, pp. 143–154 (2021)
34.
Zurück zum Zitat Ying, K., Thavai, P., Du, W.: Truz-view: developing TrustZone user interface for mobile os using delegation integration model. In: Proceedings of the 9th ACM Conference on Data and Application Security and Privacy, pp. 1–12 (2019) Ying, K., Thavai, P., Du, W.: Truz-view: developing TrustZone user interface for mobile os using delegation integration model. In: Proceedings of the 9th ACM Conference on Data and Application Security and Privacy, pp. 1–12 (2019)
35.
Zurück zum Zitat Zhao, S., et al.: Providing root of trust for ARM TrustZone using on-chip SRAM. In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices (2014) Zhao, S., et al.: Providing root of trust for ARM TrustZone using on-chip SRAM. In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices (2014)
Metadaten
Titel
Anonymous Trusted Data Relocation for TEEs
verfasst von
Vasco Guita
Daniel Andrade
João Nuno Silva
Miguel Correia
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-031-06975-8_26

Premium Partner