TEE-Based Trusted Storage

Javier Gonzalez, Philippe Bonnet

    Research output: Book / Anthology / Report / Ph.D. thesisReportResearch

    Abstract

    Today, it is safe to assume that any program or data can be compromised, if they are not protected by hardware within a secure area. Systems based on crypto-processors (e.g., a trusted platform module, a smart card or a hardware security module) rely on the properties of tamper resistant hardware to establish a tight security parameter around a reduced set of predefined functionalities. Such systems are very secure, but they impose strong constraints on the functionalities, the connectivity or the resources available within the secure area. They have not proven versatile enough to provide mainstream trusted storage for personal data. We believe that this role can be taken over by systems equipped with Trusted Execution Environments (TEE), such as ARM’s TrustZone. Indeed, even if TEEs provide weaker security guarantees than crypto-processors, they already provide a secure area on many personal devices. With the advent of programming frameworks for TEEs, interesting services can now be provided on top of a basic encryption/decryption service. In this paper, we describe our implementation of a trusted storage service within a TEE, we analyze its security and show that it can scale. We derive our design from a set of general principles for TEE-Based trusted storage, which we believe constitutes a promising avenue for future research.
    Original languageEnglish
    PublisherIT-Universitetet i København
    Number of pages10
    ISBN (Electronic)978-87-7949-310-0
    Publication statusPublished - 2014

    Keywords

    • Trusted Execution Environments (TEEs)
    • Crypto-processors
    • Trusted storage
    • Tamper resistant hardware
    • Security guarantees

    Cite this