[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications

  • Conference paper
Trust and Trustworthy Computing (Trust 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7904))

Included in the following conference series:

Abstract

Trusted Computing (TC) can improve the security of various computing platforms. However, as new computing devices emerge and application scenarios increase, current trusted computing technology cannot satisfy various new demands. For example, mobile and embedded platforms may lack security components of trusted computing, users may need a portable trusted module[13] for multiple desktop machines, and users may hope to customize their own security features for new applications. This paper presents TEEM, a system that achieves these demands by designing a mobile-based portable TC module. TEEM is built on the general mobile devices of users, and its running environment can be protected by the secure features of embedded CPUs. For desktop machines, the mobile device with TEEM can act as a trusted computing module with USB bus. Finally, we have implemented TEEM using an ARM SoC platform and evaluated the performance of TEEM.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 31.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 39.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Trusted Computing Group. Trusted platform module main specification. Version 1.2, Revision 103 (2007)

    Google Scholar 

  2. State Cryptography Administration. Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing (2007)

    Google Scholar 

  3. Feng, D., Qin, Y.: Research on Attestation Method for Trust Computing Environment. Chinese Journal of Computers (2008)

    Google Scholar 

  4. Feng, D., Qin, Y.: A property-based attestation protocol for TCM. Science China Information Sciences (March 2010)

    Google Scholar 

  5. Azema, J., Fayad, G.: M-Shield mobile security: Makeing wireless secure. Texas Instruments WhitePaper (June 2008)

    Google Scholar 

  6. ARM Limited. ARM Security Technology: Building a Secure System using TrustZone Technology. ARM Technical White Paper (2009)

    Google Scholar 

  7. TCG Mobile Phone Working Group. TCG mobile trusted module specification. Version 1.0, Revision 7.02 (April 2010)

    Google Scholar 

  8. Tate, S.R., Vishwanathan, R.: General Secure Function Evaluation using standard trusted computing hardware. In: PST 2011: International Conference on Privacy, Security and Trust, July 19-21, pp. 221–228 (2011)

    Google Scholar 

  9. Aaraj, N., Raghunathan, A., Ravi, S., Jha, A.K.: Energy and Execution Time Analysis of a Software-based Trusted Platform Module. In: Proceedings of the Conference on Design, Automation and Test in Europe. IEEE (2007)

    Google Scholar 

  10. Trusted Computing Group. Trusted Platform Module Library Part 1-4, Family ”2.0” Level 00 Revision 00.93

    Google Scholar 

  11. Real210, http://www.realarm.cn/pic/?78_490.html

  12. Intel. Mobile Platform Vision Guide for 2003 (September 2002)

    Google Scholar 

  13. Zhang, D., Han, Z., Yan, G.: A Portable TPM Based on USB Key. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, New York, NY, USA (2010)

    Google Scholar 

  14. Nepal, S., Zic, J., Liu, D., Jang, J.: Trusted Computing Platform in Your Pocket. In: EUC 2010: Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 812–817. IEEE Computer Society, Washington, DC (2010)

    Chapter  Google Scholar 

  15. Strasser, M.: TPM Emulator, http://tpm-emulator.berlios.de

  16. Software TPM Introduction(IBM), http://ibmswtpm.sourceforge.net

  17. Vasudevan, A., Owusu, E., Zhou, Z., Newsome, J., McCune, J.M.: Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 159–178. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  18. Winter, J.: Trusted computing building blocks for embedded linux-based ARM trustzone platforms. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia, USA, October 31 (2008)

    Google Scholar 

  19. Dietrich, K.: An integrated architecture for trusted computing for java enabled embedded devices. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia, USA, November 02 (2007)

    Google Scholar 

  20. Ekberg, J.-E., Bugiel, S.: Trust in a small package: minimized MRTM software implementation for mobile secure environments. In: STC 2009: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, ACM, NY (2009)

    Google Scholar 

  21. Chen, L., Ryan, M.: Attack, solution and verification for shared authorisation data in TCG TPM. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 201–216. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  22. Santos, N., Raj, H., Saroiu, S., Wolman, A.: Trusted language runtime (TLR): enabling trusted applications on smartphones. In: HotMobile 2011: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, pp. 21–26. ACM, New York (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Feng, W., Feng, D., Wei, G., Qin, Y., Zhang, Q., Chang, D. (2013). TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications. In: Huth, M., Asokan, N., Čapkun, S., Flechais, I., Coles-Kemp, L. (eds) Trust and Trustworthy Computing. Trust 2013. Lecture Notes in Computer Science, vol 7904. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38908-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38908-5_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38907-8

  • Online ISBN: 978-3-642-38908-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics