skip to main content
10.1145/1456455.1456460acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Trusted computing building blocks for embedded linux-based ARM trustzone platforms

Published:31 October 2008Publication History

ABSTRACT

Security is an emerging topic in the field of mobile and embedded platforms. The Trusted Computing Group (TCG) has outlined one possible approach to mobile platform security by recently extending their set of Trusted Computing specifications with Mobile Trusted Modules (MTMs). The MTM specification [13] published by the TCG is a platform independent approach to Trusted Computing explicitly allowing for a wide range of potential implementations. ARM follows a different approach to mobile platform security, by extending platforms with hardware supported ARM TrustZone security [3] mechanisms. This paper outlines an approach to merge TCG-style Trusted Computing concepts with ARM TrustZone technology in order to build an open Linux-based embedded trusted computing platform.

References

  1. Embedded XEN. Available online at: http://sourceforge.net/projects/embeddedxen/.Google ScholarGoogle Scholar
  2. Secure Architecture and Implementation of Xen on ARM for Mobile Devices. Presentation slides available online at: http://xensource.com/files/xensummit_4/Secure_Xen_ARM_xen--summit--04_07_Suh.pdf.Google ScholarGoogle Scholar
  3. T. Alves and D. Felton. TrustZone: Integrated Hardware and Software Security -- Enabling Trusted Computing in Embedded Systems. Available online at: http://www.arm.com/pdfs/TZ_Whitepaper.pdf, July 2004.Google ScholarGoogle Scholar
  4. A. Arcangeli. seccomp. Import into mainstream Linux kernels: http://kernel.org/hg/linux-2.6/file/cfe426c10480/kernel/seccomp.c, 2005.Google ScholarGoogle Scholar
  5. ARM. Trustzone api specification, June 2006. PRD29-USGC-000089, v2.0.Google ScholarGoogle Scholar
  6. ARM Ltd. TrustZone Technology Overview. Introduction available at: http://www.arm.com/products/esd/trustzone_home.html.Google ScholarGoogle Scholar
  7. ARM Ltd. ARM1176JZF--S Technical Reference Manual, Revision: r0p7. Available online at: http://infocenter.arm.com/help/topic/com.arm.doc.ddi0301g/DDI0301G_arm1176jzfs_r0p7_trm.pdf, 2008.Google ScholarGoogle Scholar
  8. F. Bellard. Qemu open source processor emulator. Available online at: http://bellard.org/qemu/.Google ScholarGoogle Scholar
  9. W. Denk et al. Das u-boot -- the universal boot loader. Available online at: http://www.denx.de/wiki/UBoot/WebHome.Google ScholarGoogle Scholar
  10. K. Dietrich. An integrated architecture for trusted computing for java enabled embedded devices. In STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 2--6, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. B. et al. vTPM: Virtualizing the Trusted Platform Module. Available online at: http://www.research.ibm.com/, February 14 2006.Google ScholarGoogle Scholar
  12. T. C. G. .-M. W. Group. TCG Mobile Reference Architecture Version 1.0 Revision 1. Specification available online at: https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-reference-architecture-1.0.pdf, 12 June 2007.Google ScholarGoogle Scholar
  13. T. C. G. .-M. W. Group. TCG Mobile Trusted Module Sepecification Version 1 rev. 1.0. Specification available online at: https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf, 12 June 2007.Google ScholarGoogle Scholar
  14. T. C. G.-T. W. Group. TCG Software Stack (TSS) Specification Version 1.2 Level 1. Specification available online at: https://www.trustedcomputinggroup.org/specs/TSS/TSS_Version_1.2_Level_1_FINAL.pdf, 6 January 2006. Part1: Commands and Structures.Google ScholarGoogle Scholar
  15. T. C. G.-T. W. Group. TPM Main Part 2 Structures. Specification available at: https://www.trustedcomputinggroup.org/specs/TPM/mainP2Structrev103.zip, 9 July 2007. Specification version 1.2 Level 2 Revision 103.Google ScholarGoogle Scholar
  16. T. C. G.-T. W. Group. TPM Main Part 3 Commands. Specification available online at: https://www.trustedcomputinggroup.org/specs/TPM/mainP3Commandsrev103.zip, 9 July 2007. Specification version 1.2 Level 2 Revision 103.Google ScholarGoogle Scholar
  17. M.K. Jan-Erik Ekberg. MTM implementation on the TPM emulator. Available online at: http://hemviken.fi/mtm/index.html.Google ScholarGoogle Scholar
  18. M. K. Jan-Erik Ekberg. Mobile Trusted Module (MTM) -- an introduction. Available online at: http://research.nokia.com/files/NRCTR2007015.pdf, November 14 2007.Google ScholarGoogle Scholar
  19. O. K. Labs. OKL4. Available only at: http://www.ok-labs.com/products/okl4.Google ScholarGoogle Scholar
  20. O. K. Labs. OKL4 microkernel source code, release 1.5.2. Available online at: http://wiki.ok-labs.com/images/2/20/Okl4_release_1.5.2.tar.gz.Google ScholarGoogle Scholar
  21. A. U. Schmidt, N. Kuntze, and M. Kasper. On the deployment of mobile trusted modules, 2007.Google ScholarGoogle Scholar
  22. M. Strasser. TPM Emulator. Software package available at: http://tpm--emulator.berlios.de/.Google ScholarGoogle Scholar
  23. L. Torvalds et al. The linux kernel archives. Available online at: http://www.kernel.org/.Google ScholarGoogle Scholar
  24. P. Wilson, A. Frey, T. Mihm, D. Kershaw, and T. Alves. Implementing embedded security on dual-virtual-cpu systems. IEEE Design and Test of Computers, 24(6):582--591, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. XEN Hypervisor. Available online at: http://xen.org/.Google ScholarGoogle Scholar
  26. X. Zhang, O. Aciicmez, and J.-P. Seifert. A trusted mobile phone reference architecture via secure kernel. In STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 7--14, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Trusted computing building blocks for embedded linux-based ARM trustzone platforms

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            STC '08: Proceedings of the 3rd ACM workshop on Scalable trusted computing
            October 2008
            100 pages
            ISBN:9781605582955
            DOI:10.1145/1456455

            Copyright © 2008 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 31 October 2008

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate17of31submissions,55%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader