Regulating ARM TrustZone devices in restricted spaces

Ferdinand Brasser, Daeyoung Kim, Christopher Liebchen, Vinod Ganapathy, Liviu Iftode, Ahmad Reza Sadeghi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Smart personal devices equipped with a wide range of sensors and peripherals can potentially be misused in various environments. They can be used to exfiltrate sensitive information from enterprises and federal offices or be used to smuggle unauthorized information into classrooms and examination halls. One way to prevent these situations is to regulate how smart devices are used in such restricted spaces. In this paper, we present an approach that robustly achieves this goal for ARM TrustZone-based personal devices. In our approach, restricted space hosts use remote memory operations to analyze and regulate guest devices within the restricted space. We show that the ARM TrustZone allows our approach to obtain strong security guarantees while only requiring a small trusted computing base to execute on guest devices.

Original languageEnglish
Title of host publicationMobiSys 2016 - Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services
PublisherAssociation for Computing Machinery, Inc
Pages413-425
Number of pages13
ISBN (Electronic)9781450342698
DOIs
StatePublished - Jun 20 2016
Event14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016 - Singapore, Singapore
Duration: Jun 25 2016Jun 30 2016

Publication series

NameMobiSys 2016 - Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services

Conference

Conference14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016
Country/TerritorySingapore
CitySingapore
Period6/25/166/30/16

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Electrical and Electronic Engineering

Keywords

  • ARM TrustZone
  • Mobile device security
  • Restricted spaces

Fingerprint

Dive into the research topics of 'Regulating ARM TrustZone devices in restricted spaces'. Together they form a unique fingerprint.

Cite this