Trusted Execution Environment: What It is, and What It is Not
Top Cited Papers
- 1 August 2015
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 1, 57-64
- https://doi.org/10.1109/trustcom.2015.357
Abstract
Nowadays, there is a trend to design complex, yet secure systems. In this context, the Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted platforms. TEE is commonly known as an isolated processing environment in which applications can be securely executed irrespective of the rest of the system. However, TEE still lacks a precise definition as well as representative building blocks that systematize its design. Existing definitions of TEE are largely inconsistent and unspecific, which leads to confusion in the use of the term and its differentiation from related concepts, such as secure execution environment (SEE). In this paper, we propose a precise definition of TEE and analyze its core properties. Furthermore, we discuss important concepts related to TEE, such as trust and formal verification. We give a short survey on the existing academic and industrial ARM TrustZone-based TEE, and compare them using our proposed definition. Finally, we discuss some known attacks on deployed TEE as well as its wide use to guarantee security in diverse applications.Keywords
This publication has 31 references indexed in Scilit:
- Mobile Trusted ComputingProceedings of the IEEE, 2014
- Towards an Open Framework Leveraging a Trusted Execution EnvironmentLecture Notes in Computer Science, 2013
- Authenticated Encryption Primitives for Size-Constrained Trusted ComputingLecture Notes in Computer Science, 2012
- Integrated Scheduling for a Reliable Dual-OS MonitorIPSJ Online Transactions, 2012
- Modeling and Security Analysis of a Commercial Real-Time Operating System KernelPublished by Springer Science and Business Media LLC ,2010
- Implementation Aspects of Mobile and Embedded Trusted ComputingLecture Notes in Computer Science, 2009
- Preventing interrupt overloadACM SIGPLAN Notices, 2005
- Secure payment via mobilesCard Technology Today, 2005
- TerraACM SIGOPS Operating Systems Review, 2003
- Design and verification of secure systemsACM SIGOPS Operating Systems Review, 1981