Regulating ARM TrustZone devices in restricted spaces

Ferdinand Brasser, Daeyoung Kim, Christopher Liebchen, Vinod Ganapathy, Liviu Iftode, Ahmad Reza Sadeghi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

34 Scopus citations

Abstract

Smart personal devices equipped with a wide range of sensors and peripherals can potentially be misused in various environments. They can be used to exfiltrate sensitive information from enterprises and federal offices or be used to smuggle unauthorized information into classrooms and examination halls. One way to prevent these situations is to regulate how smart devices are used in such restricted spaces. In this paper, we present an approach that robustly achieves this goal for ARM TrustZone-based personal devices. In our approach, restricted space hosts use remote memory operations to analyze and regulate guest devices within the restricted space. We show that the ARM TrustZone allows our approach to obtain strong security guarantees while only requiring a small trusted computing base to execute on guest devices.

Original languageEnglish
Title of host publicationMobiSys 2016 - Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services
PublisherAssociation for Computing Machinery, Inc
Pages413-425
Number of pages13
ISBN (Electronic)9781450342698
DOIs
StatePublished - 20 Jun 2016
Event14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016 - Singapore, Singapore
Duration: 25 Jun 201630 Jun 2016

Publication series

NameMobiSys 2016 - Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services

Conference

Conference14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016
Country/TerritorySingapore
CitySingapore
Period25/06/1630/06/16

Keywords

  • ARM TrustZone
  • Mobile device security
  • Restricted spaces

Fingerprint

Dive into the research topics of 'Regulating ARM TrustZone devices in restricted spaces'. Together they form a unique fingerprint.

Cite this