In TrustZone-assisted TEEs, the trusted OS has unrestricted access to both secure and normal world memory. Unfortunately, this architectural limitation has opened an aisle of exploration for attackers, which have demonstrated how to leverage a chain of exploits to hijack the trusted OS and gain full control of the system, targeting (i) the rich execution environment (REE), (ii) all trusted applications (TAs), and (iii) the secure monitor. In this paper, we propose REZONE. The main novelty behind REZONE design relies on leveraging TrustZone-agnostic hardware primitives available on commercially off-the-shelf (COTS) platforms to restrict the privileges of the trusted OS. With REZONE, a monolithic TEE is restructured and partitioned i...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
Compartmentalization techniques like Trusted Execution Environments (TEEs) are a well-established s...
Abstract. With the wide usage of smartphones in our daily life, new malware is emerging to compromis...
Arm TrustZone is a hardware technology that adds significant value to the ongoing security picture. ...
General-purpose operating systems (GPOS), such as Linux, encompass several million lines of code. S...
Security is one of the main challenges of the Internet of Things (IoT). IoT devices are mainly powe...
During the last decade, Trusted Execution Environment (TEE) provided by ARM TrustZone had become one...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the impleme...
ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some v...
Nowadays, users perform various essential activities through their smartphones, including mobile pay...
Virtualization technology starts becoming more and more widespread in the embedded systems arena, dr...
The pervasive use of embedded computing systems in modern societies altogether with the industry tre...
With the advent of the Internet of Things (IoT), security has emerged as a major design goal for sma...
Trusted Execution Environments (TEEs) embedded in IoT devices provide a deployable solution to secur...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
Compartmentalization techniques like Trusted Execution Environments (TEEs) are a well-established s...
Abstract. With the wide usage of smartphones in our daily life, new malware is emerging to compromis...
Arm TrustZone is a hardware technology that adds significant value to the ongoing security picture. ...
General-purpose operating systems (GPOS), such as Linux, encompass several million lines of code. S...
Security is one of the main challenges of the Internet of Things (IoT). IoT devices are mainly powe...
During the last decade, Trusted Execution Environment (TEE) provided by ARM TrustZone had become one...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the impleme...
ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some v...
Nowadays, users perform various essential activities through their smartphones, including mobile pay...
Virtualization technology starts becoming more and more widespread in the embedded systems arena, dr...
The pervasive use of embedded computing systems in modern societies altogether with the industry tre...
With the advent of the Internet of Things (IoT), security has emerged as a major design goal for sma...
Trusted Execution Environments (TEEs) embedded in IoT devices provide a deployable solution to secur...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
Compartmentalization techniques like Trusted Execution Environments (TEEs) are a well-established s...
Abstract. With the wide usage of smartphones in our daily life, new malware is emerging to compromis...