최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.31 no.2, 2021년, pp.167 - 174
한승균 (충남대학교) , 장진수 (충남대학교)
The trusted execution environment (TEE) such as ARM TrustZone is widely adopted to protect security-critical logic and data. Specifically, the crypto operation is generally hosted in the TEE and leveraged to build various trusted services (e.g., DRM). Although the crypto operation plays a critical r...
ARM, "Arm® TrustZone® CryptoCell-712 Revision 1.19," ARM limited, June 2018.
Linaro, "OP-TEE Documentation," TrustedFirmware.org, April 2021.
McCune, Jonathan M., et al., "TrustVisor: Efficient TCB reduction and attestation," 2010 IEEE Symposium on Security and Privacy, pp. 1-1, May 2010.
Jang, Jinsoo, et al., "Privatezone: Providing a private execution environment using arm trustzone," IEEE Transactions on Dependable and Secure Computing, pp. 797-810, Oct. 2016.
Brasser, Ferdinand, et al., "SANCTUARY: ARMing TrustZone with User-space Enclaves," Network and Distributed Systems Security (NDSS), pp. 1-1, Feb. 2019.
Azab, Ahmed M., et al., "SKEE: A lightweight Secure Kernel-level Execution Environment for ARM," Network and Distributed Systems Security (NDSS), pp. 1-1, Feb. 2016.
Cho, Yeongpil, et al., "Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM," Network and Distributed Systems Security (NDSS), pp. 1-1, Feb. 2017.
McCune, Jonathan M., et al., "Flicker: An execution infrastructure for TCB minimization," Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems, pp. 315-328, April 2008.
Raj, Himanshu, et al., "fTPM: A Software-Only Implementation of a {TPM} Chip," USENIX Security Symposium, pp. 841-856, Aug. 2016.
ARM, "Arm Architecture Reference Manual," Armv8, June 2020.
McVoy, Larry W., and Carl Staelin, "lmbench: Portable Tools for Performance Analysis," USENIX annual technical conference, pp. 23-39, Jan. 1996.
Halderman, J. Alex, et al., "Lest we remember: cold-boot attacks on encryption keys," Usenix Security Symposium, pp. 45-60, Aug. 2008
Kocher, Paul, et al., "Spectre attacks: Exploiting speculative execution," IEEE Symposium on Security and Privacy (SP), pp. 1-19, May 2019.
Lipp, Moritz, et al., "Meltdown: Reading kernel memory from user space," USENIX Security Symposium, pp. 973-990, Aug. 2018.
Ahmed M. Azab, et al., "Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World," Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, pp. 90-102, Nov. 2014
Sun, He, et al., "Trustice: Hardware-assisted isolated computing environments on mobile devices," 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 367-378, June 2015.
Cho, Yeongpil, et al., "Hardware-assisted on-demand hypervisor activation for efficient security critical code execution on mobile devices," USENIX Annual Technical Conference, pp. 565-578, June 2016.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.