Abstract
Trusted Computing (TC) can improve the security of various computing platforms. However, as new computing devices emerge and application scenarios increase, current trusted computing technology cannot satisfy various new demands. For example, mobile and embedded platforms may lack security components of trusted computing, users may need a portable trusted module[13] for multiple desktop machines, and users may hope to customize their own security features for new applications. This paper presents TEEM, a system that achieves these demands by designing a mobile-based portable TC module. TEEM is built on the general mobile devices of users, and its running environment can be protected by the secure features of embedded CPUs. For desktop machines, the mobile device with TEEM can act as a trusted computing module with USB bus. Finally, we have implemented TEEM using an ARM SoC platform and evaluated the performance of TEEM.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Trusted Computing Group. Trusted platform module main specification. Version 1.2, Revision 103 (2007)
State Cryptography Administration. Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing (2007)
Feng, D., Qin, Y.: Research on Attestation Method for Trust Computing Environment. Chinese Journal of Computers (2008)
Feng, D., Qin, Y.: A property-based attestation protocol for TCM. Science China Information Sciences (March 2010)
Azema, J., Fayad, G.: M-Shield mobile security: Makeing wireless secure. Texas Instruments WhitePaper (June 2008)
ARM Limited. ARM Security Technology: Building a Secure System using TrustZone Technology. ARM Technical White Paper (2009)
TCG Mobile Phone Working Group. TCG mobile trusted module specification. Version 1.0, Revision 7.02 (April 2010)
Tate, S.R., Vishwanathan, R.: General Secure Function Evaluation using standard trusted computing hardware. In: PST 2011: International Conference on Privacy, Security and Trust, July 19-21, pp. 221–228 (2011)
Aaraj, N., Raghunathan, A., Ravi, S., Jha, A.K.: Energy and Execution Time Analysis of a Software-based Trusted Platform Module. In: Proceedings of the Conference on Design, Automation and Test in Europe. IEEE (2007)
Trusted Computing Group. Trusted Platform Module Library Part 1-4, Family ”2.0” Level 00 Revision 00.93
Intel. Mobile Platform Vision Guide for 2003 (September 2002)
Zhang, D., Han, Z., Yan, G.: A Portable TPM Based on USB Key. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, New York, NY, USA (2010)
Nepal, S., Zic, J., Liu, D., Jang, J.: Trusted Computing Platform in Your Pocket. In: EUC 2010: Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 812–817. IEEE Computer Society, Washington, DC (2010)
Strasser, M.: TPM Emulator, http://tpm-emulator.berlios.de
Software TPM Introduction(IBM), http://ibmswtpm.sourceforge.net
Vasudevan, A., Owusu, E., Zhou, Z., Newsome, J., McCune, J.M.: Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 159–178. Springer, Heidelberg (2012)
Winter, J.: Trusted computing building blocks for embedded linux-based ARM trustzone platforms. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia, USA, October 31 (2008)
Dietrich, K.: An integrated architecture for trusted computing for java enabled embedded devices. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia, USA, November 02 (2007)
Ekberg, J.-E., Bugiel, S.: Trust in a small package: minimized MRTM software implementation for mobile secure environments. In: STC 2009: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, ACM, NY (2009)
Chen, L., Ryan, M.: Attack, solution and verification for shared authorisation data in TCG TPM. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 201–216. Springer, Heidelberg (2010)
Santos, N., Raj, H., Saroiu, S., Wolman, A.: Trusted language runtime (TLR): enabling trusted applications on smartphones. In: HotMobile 2011: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, pp. 21–26. ACM, New York (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Feng, W., Feng, D., Wei, G., Qin, Y., Zhang, Q., Chang, D. (2013). TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications. In: Huth, M., Asokan, N., Čapkun, S., Flechais, I., Coles-Kemp, L. (eds) Trust and Trustworthy Computing. Trust 2013. Lecture Notes in Computer Science, vol 7904. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38908-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-38908-5_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38907-8
Online ISBN: 978-3-642-38908-5
eBook Packages: Computer ScienceComputer Science (R0)