Proceedings of the 3rd Workshop on System Software for Trusted Execution最新文献

筛选
英文 中文
VirtSense: Virtualize Sensing through ARM TrustZone on Internet-of-Things VirtSense:通过ARM TrustZone在物联网上实现感知虚拟化
Proceedings of the 3rd Workshop on System Software for Trusted Execution Pub Date : 2018-01-15 DOI: 10.1145/3268935.3268937
Renju Liu, Mani Srivastava
{"title":"VirtSense: Virtualize Sensing through ARM TrustZone on Internet-of-Things","authors":"Renju Liu, Mani Srivastava","doi":"10.1145/3268935.3268937","DOIUrl":"https://doi.org/10.1145/3268935.3268937","url":null,"abstract":"Internet-of-Things (IoTs) are becoming more and more popular in our life. IoT devices are generally designed for sensing or actuation purposes. However, the current sensing system on IoT devices lacks the understanding of sensing needs, which diminishes the sensing flexibility, isolation, and security when multiple sensing applications need to use sensor resources. In this work, we propose VirtSense, an ARM TrustZone based virtual sensing system, to provide each sensing application a virtual sensor instance, which further enables a safe, flexible and isolated sensing environment on the IoT devices. Our preliminary results show that VirtSense: 1) can provide virtual sensor instance for each sensing application so that the sensing needs of each application will be satisfied without affecting others; 2) is able to enforce access control policy even under an untrusted environment.","PeriodicalId":142419,"journal":{"name":"Proceedings of the 3rd Workshop on System Software for Trusted Execution","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132168356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Trusted Execution on Leaky Hardware? 漏洞硬件上的可信执行?
Proceedings of the 3rd Workshop on System Software for Trusted Execution Pub Date : 2018-01-15 DOI: 10.1145/3268935.3268946
Daniel Genkin, Y. Yarom
{"title":"Trusted Execution on Leaky Hardware?","authors":"Daniel Genkin, Y. Yarom","doi":"10.1145/3268935.3268946","DOIUrl":"https://doi.org/10.1145/3268935.3268946","url":null,"abstract":"In recent years, processor vendors have started offering trusted Execution Environments (TEEs), which provide semi-isolated areas for secure code execution. TEEs promise to protect the integrity and confidentiality of the computation executing within them even when the operating system is compromised. Prime among these is Intel's Software Guard Extensions (SGX), which not only protects the execution of software running within it, but also provides infrastructure for secure attestation for remote parties. To provide its ambitions security guarantees, SGX must rely on the security of the underlying processor implementation, which is known to leak information through microarchitectural timing side channels. Acknowledging this limitation, Intel declared timing channels to be out-of-scope for the security model of SGX, raising the question of whether trusted execution can be supported on leaky hardware. In this talk we investigate the intricate interaction between Trusted Execution Environments and microarchitectural side channel attacks. Besides surveying published works in this area, we argue that the strong attack model in which TEEs typically operate significantly exacerbates the effectiveness of microarchitectural side channels. Finally, we conclude by presenting some live demonstrations and future research directions.","PeriodicalId":142419,"journal":{"name":"Proceedings of the 3rd Workshop on System Software for Trusted Execution","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133412290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信