skip to main content
10.1145/2508859.2516758acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
tutorial

Trusted execution environments on mobile devices

Published: 04 November 2013 Publication History

Abstract

A trusted execution environment (TEE) is a secure processing environment that is isolated from the normal processing environment where the device operating system and applications run. The first mobile phones with hardware-based TEEs appeared almost a decade ago, and today almost every smartphone and tablet contains a TEE like ARM TrustZone. Despite such a large-scale deployment, the use of TEE functionality has been limited for developers. With emerging standardization this situation is about to change. In this tutorial, we explain the security features provided by mobile TEEs and describe On-board Credentials (ObC) system that enables third-party TEE development. We discuss ongoing TEE standardization activities, including the recent Global Platform standards and the Trusted Platform Module (TPM) 2.0 specification, and identify open problems for the near future of mobile hardware security.

References

[1]
ARM. Trustzone technology overview, 2009.
[2]
GlobalPlatform. GlobalPlatform's GPD/STIP Solution for Mobile Security, August 2007. GlobalPlatform white paper.
[3]
Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, and Aarne Rantala. On-board credentials with open provisioning. In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2009.
[4]
RSA Laboratories. PKCS# 11 v2.20: Cryptographic Token Interface Standard, 2004.
[5]
Oracle. JSR 177: Security and trust services API for J2ME, 2007.
[6]
Trusted Computing Group. TPM 2.0 library specification, parts 1--4, Level 00, Rev. 00.96, March 2013.

Cited By

View all
  • (2025)Bringing Smart Contract Confidentiality via Trusted Hardware: Fact and FictionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.348429120(159-174)Online publication date: 2025
  • (2024)SoKProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699193(5233-5250)Online publication date: 14-Aug-2024
  • (2024)FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and IsolationFuture Internet10.3390/fi1608028816:8(288)Online publication date: 8-Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
November 2013
1530 pages
ISBN:9781450324779
DOI:10.1145/2508859
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2013

Check for updates

Author Tags

  1. mobile devices
  2. trusted execution environments

Qualifiers

  • Tutorial

Conference

CCS'13
Sponsor:

Acceptance Rates

CCS '13 Paper Acceptance Rate 105 of 530 submissions, 20%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)106
  • Downloads (Last 6 weeks)14
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Bringing Smart Contract Confidentiality via Trusted Hardware: Fact and FictionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.348429120(159-174)Online publication date: 2025
  • (2024)SoKProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699193(5233-5250)Online publication date: 14-Aug-2024
  • (2024)FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and IsolationFuture Internet10.3390/fi1608028816:8(288)Online publication date: 8-Aug-2024
  • (2024)SecuDB: An In-Enclave Privacy-Preserving and Tamper-Resistant Relational DatabaseProceedings of the VLDB Endowment10.14778/3685800.368581517:12(3906-3919)Online publication date: 8-Nov-2024
  • (2024)Secure Aggregation for Clustered Federated Learning With Passive AdversariesIEEE Transactions on Communications10.1109/TCOMM.2024.336639472:7(4117-4133)Online publication date: Jul-2024
  • (2024)TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCBIEEE Access10.1109/ACCESS.2024.336634412(26536-26549)Online publication date: 2024
  • (2024)Advances in Privacy Preservation TechnologiesPrivacy Computing10.1007/978-981-99-4943-4_2(17-42)Online publication date: 13-Feb-2024
  • (2024)Mobile Phones in the Cloud-Edge Continuum: Understanding the TEE’s RoleAdvanced Information Networking and Applications10.1007/978-3-031-57931-8_23(234-243)Online publication date: 9-Apr-2024
  • (2024)Characterizing Privacy Risks in Healthcare IoT SystemsSecure and Resilient Digital Transformation of Healthcare10.1007/978-3-031-55829-0_4(51-68)Online publication date: 16-Mar-2024
  • (2023)PrintShearProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35962577:2(1-22)Online publication date: 12-Jun-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media