Nearly every smartphone, and even some feature phones, today contains a hardware-based trusted execution environment (TEE). Smartphones with TEEs first appeared almost a decade ago, but their use has been limited – application developers have not had the means to make use of TEEs to improve the security (and usability) of their applications. In this article, we discuss why TEEs are so widely deployed in mobile devices, and what kind of capabilities they support. We then describe Nokia Research Center’s On-board Credentials (ObC) system which opens up the device TEE to application developers and some example applications that make use of ObC. We conclude by briefly outlining recent developments in standardizing TEE functionality.
The rapid growth in the number of online services leads to an increasing number of different digital...
The incumbent physical security system on smartphones is known to dissatisfy users. It comprises exp...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Hardware-based trusted execution environments (TEEs) have been available in mobile devices for more ...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
We are now in the post-PC era, yet our mobile devices are insecure. We consider the different stake-...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Over the last decade the popularity of mobile devices has increased enormously. Initially, personal ...
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet thei...
Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones...
have had such a dramatic impact on our personal and professional lives as mobility. Mobile devices s...
In today's era of technology, information can revolve the whole world within seconds via Internet. D...
ACM 978-1-4503-2139-6/13/09...$15.00. Insucient security and privacy level on mobile devices, have m...
International audienceNowadays, smartphones are able to process large amounts of data enabling the u...
The rapid growth in the number of online services leads to an increasing number of different digital...
The incumbent physical security system on smartphones is known to dissatisfy users. It comprises exp...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Hardware-based trusted execution environments (TEEs) have been available in mobile devices for more ...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
We are now in the post-PC era, yet our mobile devices are insecure. We consider the different stake-...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Over the last decade the popularity of mobile devices has increased enormously. Initially, personal ...
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet thei...
Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones...
have had such a dramatic impact on our personal and professional lives as mobility. Mobile devices s...
In today's era of technology, information can revolve the whole world within seconds via Internet. D...
ACM 978-1-4503-2139-6/13/09...$15.00. Insucient security and privacy level on mobile devices, have m...
International audienceNowadays, smartphones are able to process large amounts of data enabling the u...
The rapid growth in the number of online services leads to an increasing number of different digital...
The incumbent physical security system on smartphones is known to dissatisfy users. It comprises exp...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...