Abstract
With the wide application of the mobile Internet, many aspects such as mobile payment, mobile office, private-data protection, security control of terminals and so on will face huge secure pressure. For that reason, this paper presents a supervisory control architecture based on secure SOC system with attack-immune and trustworthiness for intelligent terminals, which possesses ability for dynamic integrity measurement (DIM) without interference and trusted escrow application, meanwhile, this trusted architecture is fully verified based on FPGA prototype system. Compared with other schemes, this trusted architecture has higher security and dynamic integrity measurement efficiency, which can thoroughly supervise running of mobile OS and applications.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Grossschadl, J., Vejda, T., Page, D.: Reassessing the TCG specifications for trusted computing in mobile and embedded systems. In: IEEE International Workshop on Hardware-oriented Security & Trust. IEEE (2008)
Alves, T., Felton, D., Alves, T., et al.: Trustzone: integrated hardware and software security. ARM white paper. White Paper (2004)
Jiang, H., Chang, R., Ren, L., et al.: Implementing a ARM-based secure boot scheme for the isolated execution environment. In: 2017 13th International Conference on Computational Intelligence and Security (CIS). IEEE (2017)
Xiao, J., Yang, Z., Hu, X., Liu, Y., Li, D.: TrustZone-based mobile terminal security system. In: 2018 Chinese Automation Congress (CAC), Xi’an, China, pp. 3981–3985 (2018)
Pinto, S., Pereira, J., Gomes, T., et al.: Towards a TrustZone-assisted hypervisor for real-time embedded systems. IEEE Comput. Arch. Lett. PP(99) (2016)
González, J., Hölzl, M., Riedl, P., Bonnet, P., Mayrhofer, R.: A practical hardware-assisted approach to customize trusted boot for mobile devices. In: Chow, Sherman S.M., Camenisch, J., Hui, Lucas C.K., Yiu, S.M. (eds.) ISC 2014. LNCS, vol. 8783, pp. 542–554. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-13257-0_35
Bratus, S., D’Cunha, N., Sparks, E., et al.: TOCTOU, traps, and trusted computing. In: International Conference on Trusted Computing-challenges & Applications. DBLP (2008)
Chen, M., Li, R., Li, N., et al.: A mobile terminal operating environment security measurement framework. In: International Conference on Intelligent Computation Technology & Automation. IEEE Computer Society (2017)
Hu, M., Yang, Y., Lv, G., Liu, X.: Research on dynamic integrity measurement strategy based on measurement point distribution. In: 2018 Chinese Control And Decision Conference (CCDC), Shenyang, pp. 220–223 (2018)
Detken, K., Jahnke, M., Rix, T., Rein, A.: Software-design for internal security checks with dynamic integrity measurement (DIM). In: 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Bucharest, pp. 367–373 (2017)
Liu, Z.W., Feng, D.G.: TPM-based dynamic integrity measurement architecture. Dianzi Yu Xinxi Xuebao/J. Electron. Inf. Technol. 32(4), 875–879 (2010)
Du, R., Pan, W., Tian, J., et al.: Dynamic integrity measurement model based on vTPM. Chin. Commun. 15(2), 88–99 (2018)
Wei, C., Song, S., Hua, W., et al.: Operating systems support for process dynamic integrity measurement. In: IEEE Youth Conference on Information, Computing & Telecommunication. IEEE (2009)
Acknowledgement
This work is supported by the National Nature Science Foundation of China through project 61972018.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Cheng, D., Liu, J., Guan, Z., Hu, J. (2020). An Attack-Immune Trusted Architecture for Supervisory Intelligent Terminal. In: Qiu, M. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2020. Lecture Notes in Computer Science(), vol 12454. Springer, Cham. https://doi.org/10.1007/978-3-030-60248-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-60248-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-60247-5
Online ISBN: 978-3-030-60248-2
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)