skip to main content
10.1145/1314354.1314358acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

An integrated architecture for trusted computing for java enabled embedded devices

Published:02 November 2007Publication History

ABSTRACT

This paper presents a concept for enhancing mobile and embedded devices with trusted computing (TC)technology. It outlines a new architecture focusing on SUN's J2ME platform, including the design for a Mobile Trusted Module (MTM) to be used as a trusted computing base. The proposed architecture combines all software components required for accessing an MTM and shows how TC functionality can be provided for mobile applications. Moreover, different deployment scenarios of the architecture and its components are discussed. In order to prove that an implementation of the concept is feasible, a prototype of the architecture has been developed. For the design of the new architecture, special attention was turned to reusing currently existing technology and hardware rather than designing new hardware. By using already existing components, this paper also gives an answer to the question of how a mobile trusted-computing-enhanced system could be implemented with currently available technology

References

  1. Java Community Process JSR 218. Connected Device Configuration (CDC) 1.1. Specification available at: http://jcp.org/en/jsr/detail?id=218, 19 August 2005.Google ScholarGoogle Scholar
  2. Kurt Dietrich. Secrure Signature Creation using the Java 2 Micro Edition on Mobile Devices. Master's thesis, Institute for Applied Information Processing and Communications, Technical University Graz, Austria, Inffeldgasse 16a, 8010 Graz, Austria, October 2003.Google ScholarGoogle Scholar
  3. Trusted Computing Group Mobile Working Group. TCG Mobile Trusted Module Sepecification Version 1 rev. 1.0. Specification available online at: https://www.trustedcomputinggroup.org/specs/ mobilephone/tcg-mobile-trusted-module-1.0.pdf, 12 June 2007.Google ScholarGoogle Scholar
  4. Trusted Computing Group TPM Working Group. TPM Main Part 2 Structures. Specification available at: https://www.trustedcomputinggroup.org/ specs/TPM/Main_Part2_Rev94.zip, 29 March 2006. Specification version 1.2 Level 2 Revision 94.Google ScholarGoogle Scholar
  5. Trusted Computing Group TPM Working Group. TPM Main Part 3 Commands. Specification available online at: https://www.trustedcomputinggroup.org/ specs/TPM/Main_Part3_Rev94.zip, 29 March 2006. Specification version 1.2 Level 2 Revision 94.Google ScholarGoogle Scholar
  6. Trusted Computing Group TSS Working Group. TCG Software Stack (TSS) Specification Version 1.2 Level 1. Specification available online at: https://www.trustedcomputinggroup.org/specs/TSS/TSS_Version_1.2_Level_1_FINAL.pdf, 6 January 2006. Part1: Commands and Structures.Google ScholarGoogle Scholar
  7. International Organisation for Standardisation. ISO/IEC 7816-4, 2005. Part 4: Interindustry commands for interchange.Google ScholarGoogle Scholar
  8. Trusted Computing for Java. Available online at: http://trustedjava.sourceforge.net/.Google ScholarGoogle Scholar
  9. Yellin Frank Lindholm Tim. The Java Virtual Machine Specification.Second Edition. Available online at: http://java.sun.com/docs/books/jvms/ second_edition/html/VMSpecTOC.doc.html.Google ScholarGoogle Scholar
  10. ARM Ltd. SecurCore SC200. Overview available at: http://www.arm.com/products/CPUs/SecurCore_SC200.html, 19 August 2005.Google ScholarGoogle Scholar
  11. Sun Microsystems. Java Card Technology. Overview available at: http://java.sun.com/products/javacard/.Google ScholarGoogle Scholar
  12. Sun Microsystems. Java Native Interface Specification. Available online at: http://java.sun.com/j2se/1.5.0/docs/guide/jni/spec/jniTOC.html.Google ScholarGoogle Scholar
  13. Chamseddine Talhi Mourad Debbabi, Mohamed Saleh and Sami Zhioua. Security Evaluation of J2ME CLDC Embedded Java Platform. Journal of Object Technlogy, 5(2):125--154, March-April 2006.Google ScholarGoogle Scholar
  14. SUN Developer Network. Java ME at a Glance. Specifications & Articles availablbe at: http://java.sun.com/javame/index.jsp.Google ScholarGoogle Scholar
  15. Enrique C. Ortiz. Introduction to OTA Application Provisioning. Technical report, SUN Developer Network, November 2002. Article available at: http://developers.sun.com/mobility/midp/articles/ota/.Google ScholarGoogle Scholar
  16. Siani Pearson. Trusted Computing Platforms, the Next Security Solution. Technical report, Trusted E-Services Laboratory, HP Laboratories Bristol HPL-2002-221, 5 November 2002.Google ScholarGoogle Scholar
  17. SUN Community process JSR 139. J2ME(TM) Connected Limited Device Configuration (CLDC) Specification 1.1 Final Release. Specification available at: http://jcp.org/aboutJava/communityprocess/final/jsr139/index.html, 4 March 2004.Google ScholarGoogle Scholar
  18. SUN Community process JSR 271. J2ME(TM) Mobile Information Device Profile (MIDP) 3.0. Draft available at: http://www.jcp.org/en/jsr/detail?id=271. Work in progress.Google ScholarGoogle Scholar
  19. Müller Thomas Sarmenta Luis, Rhodes Jonathan. TPM/J Java-based API for the Trusted Platform Module (TPM). Available online at: http://projects.csail.mit.edu/tc/tpmj/, 3 April 2007.Google ScholarGoogle Scholar
  20. Janne Uusilehto. How to establish mobile security. Available online at: http://www.mobilehandsetdesignline.com/showArticle.jhtml?printableArticle=true&articleId=196701831, 24 December 2006.Google ScholarGoogle Scholar

Index Terms

  1. An integrated architecture for trusted computing for java enabled embedded devices

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing
            November 2007
            82 pages
            ISBN:9781595938886
            DOI:10.1145/1314354

            Copyright © 2007 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 2 November 2007

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate17of31submissions,55%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader