This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds offered by ARM platforms with TrustZone technology. The design is based on a dual-hypervisor scheme that allows executing multiple two-world domains in isolation, where each of them can comprise both a standard (i.e., non-secure) execution environment, and a trusted execution environment (TEE). An implementation of the proposed design is presented and discussed by building upon Xvisor, a Type-1 open-source hypervisor. Experimental results to assess the performance of the implementation are finally reported and discussed
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
The need for security and virtualization capabilities in modern cyber-physical systems is increasing...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
Virtualization technology starts becoming more and more widespread in the embedded systems arena, dr...
Arm TrustZone is a hardware technology that adds significant value to the ongoing security picture. ...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
Virtualization has been deployed as a key enabling technology for coping with the ever growing compl...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
Virtualization has been deployed as a key enabling technology for coping with the ever growing compl...
Virtualization is an emerging technology which provides organizations with a wide range of benefits....
Abstract—As the ARM architecture has become the favored platform for the fastest growing computing s...
Virtualization technology starts becoming more and more widespread in the embedded systems arena, dr...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
The need for security and virtualization capabilities in modern cyber-physical systems is increasing...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
Virtualization technology starts becoming more and more widespread in the embedded systems arena, dr...
Arm TrustZone is a hardware technology that adds significant value to the ongoing security picture. ...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
Virtualization has been deployed as a key enabling technology for coping with the ever growing compl...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
Virtualization has been deployed as a key enabling technology for coping with the ever growing compl...
Virtualization is an emerging technology which provides organizations with a wide range of benefits....
Abstract—As the ARM architecture has become the favored platform for the fastest growing computing s...
Virtualization technology starts becoming more and more widespread in the embedded systems arena, dr...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...