A survey on the (in)security of trusted execution environments

dc.contributor.authorMuñoz-Gallego, Antonio Jesús
dc.contributor.authorRíos-del-Pozo, Rubén
dc.contributor.authorRomán-Castro, Rodrigo
dc.contributor.authorLópez-Muñoz, Francisco Javier
dc.date.accessioned2023-04-21T09:12:09Z
dc.date.available2023-04-21T09:12:09Z
dc.date.issued2023
dc.departamentoLenguajes y Ciencias de la Computación
dc.description.abstractAs the number of security and privacy attacks continue to grow around the world, there is an ever increasing need to protect our personal devices. As a matter of fact, more and more manufactures are relying on Trusted Execution Environments (TEEs) to shield their devices. In particular, ARM TrustZone (TZ) is being widely used in numerous embedded devices, especially smartphones, and this technology is the basis for secure solutions both in industry and academia. However, as shown in this paper, TEE is not bullet-proof and it has been successfully attacked numerous times and in very different ways. To raise awareness among potential stakeholders interested in this technology, this paper provides an extensive analysis and categorization of existing vulnerabilities in TEEs and highlights the design flaws that led to them. The presented vulnerabilities, which are not only extracted from existing literature but also from publicly available exploits and databases, are accompanied by some effective countermeasures to reduce the likelihood of new attacks. The paper ends with some appealing challenges and open issues.es_ES
dc.description.sponsorshipFunding for open access charge: Universidad de Málaga / CBUA This work has been partially supported by the Spanish Ministry of Science and Innovation through the SecureEDGE project (PID2019-110565RB-I00), and by the by the Andalusian FEDER 2014–2020 Program through the SAVE project (PY18-3724).es_ES
dc.identifier.citationAntonio Muñoz, Ruben Ríos, Rodrigo Román, Javier López, A survey on the (in)security of trusted execution environments, Computers & Security, Volume 129, 2023, 103180, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2023.103180.es_ES
dc.identifier.doi10.1016/j.cose.2023.103180
dc.identifier.urihttps://hdl.handle.net/10630/26340
dc.language.isoenges_ES
dc.publisherElsevieres_ES
dc.rightsAtribución 4.0 Internacional*
dc.rights.accessRightsopen accesses_ES
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectSeguridad informáticaes_ES
dc.subjectOrdenadores - Medidas de seguridades_ES
dc.subjectInformática - Medidas de seguridades_ES
dc.subject.otherComputer securityes_ES
dc.subject.otherSecure hardwarees_ES
dc.subject.otherTrusted execution environmentses_ES
dc.subject.otherHardware attackses_ES
dc.subject.otherSoftware attackses_ES
dc.subject.otherSide-channel attackses_ES
dc.titleA survey on the (in)security of trusted execution environmentses_ES
dc.typejournal articlees_ES
dc.type.hasVersionVoRes_ES
dspace.entity.typePublication
relation.isAuthorOfPublication8f1a37f8-6ea7-4fcf-9ed7-edd9c5c80dca
relation.isAuthorOfPublicationc85f06a0-993b-4cfe-9cf3-4b943851b9e4
relation.isAuthorOfPublicationdf7085d7-1020-45fd-8fe9-84298fc79c57
relation.isAuthorOfPublicationc1875514-a0c5-4d77-a6f1-f7dfc736eeb2
relation.isAuthorOfPublication.latestForDiscovery8f1a37f8-6ea7-4fcf-9ed7-edd9c5c80dca

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
1-s2.0-S0167404823000901-main.pdf
Size:
3.54 MB
Format:
Adobe Portable Document Format
Description:

Collections