Skip to main content

An Attack-Immune Trusted Architecture for Supervisory Intelligent Terminal

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12454))

  • 1826 Accesses

Abstract

With the wide application of the mobile Internet, many aspects such as mobile payment, mobile office, private-data protection, security control of terminals and so on will face huge secure pressure. For that reason, this paper presents a supervisory control architecture based on secure SOC system with attack-immune and trustworthiness for intelligent terminals, which possesses ability for dynamic integrity measurement (DIM) without interference and trusted escrow application, meanwhile, this trusted architecture is fully verified based on FPGA prototype system. Compared with other schemes, this trusted architecture has higher security and dynamic integrity measurement efficiency, which can thoroughly supervise running of mobile OS and applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Grossschadl, J., Vejda, T., Page, D.: Reassessing the TCG specifications for trusted computing in mobile and embedded systems. In: IEEE International Workshop on Hardware-oriented Security & Trust. IEEE (2008)

    Google Scholar 

  2. Alves, T., Felton, D., Alves, T., et al.: Trustzone: integrated hardware and software security. ARM white paper. White Paper (2004)

    Google Scholar 

  3. Jiang, H., Chang, R., Ren, L., et al.: Implementing a ARM-based secure boot scheme for the isolated execution environment. In: 2017 13th International Conference on Computational Intelligence and Security (CIS). IEEE (2017)

    Google Scholar 

  4. Xiao, J., Yang, Z., Hu, X., Liu, Y., Li, D.: TrustZone-based mobile terminal security system. In: 2018 Chinese Automation Congress (CAC), Xi’an, China, pp. 3981–3985 (2018)

    Google Scholar 

  5. Pinto, S., Pereira, J., Gomes, T., et al.: Towards a TrustZone-assisted hypervisor for real-time embedded systems. IEEE Comput. Arch. Lett. PP(99) (2016)

    Google Scholar 

  6. González, J., Hölzl, M., Riedl, P., Bonnet, P., Mayrhofer, R.: A practical hardware-assisted approach to customize trusted boot for mobile devices. In: Chow, Sherman S.M., Camenisch, J., Hui, Lucas C.K., Yiu, S.M. (eds.) ISC 2014. LNCS, vol. 8783, pp. 542–554. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-13257-0_35

    Chapter  Google Scholar 

  7. Bratus, S., D’Cunha, N., Sparks, E., et al.: TOCTOU, traps, and trusted computing. In: International Conference on Trusted Computing-challenges & Applications. DBLP (2008)

    Google Scholar 

  8. Chen, M., Li, R., Li, N., et al.: A mobile terminal operating environment security measurement framework. In: International Conference on Intelligent Computation Technology & Automation. IEEE Computer Society (2017)

    Google Scholar 

  9. Hu, M., Yang, Y., Lv, G., Liu, X.: Research on dynamic integrity measurement strategy based on measurement point distribution. In: 2018 Chinese Control And Decision Conference (CCDC), Shenyang, pp. 220–223 (2018)

    Google Scholar 

  10. Detken, K., Jahnke, M., Rix, T., Rein, A.: Software-design for internal security checks with dynamic integrity measurement (DIM). In: 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Bucharest, pp. 367–373 (2017)

    Google Scholar 

  11. Liu, Z.W., Feng, D.G.: TPM-based dynamic integrity measurement architecture. Dianzi Yu Xinxi Xuebao/J. Electron. Inf. Technol. 32(4), 875–879 (2010)

    Google Scholar 

  12. Du, R., Pan, W., Tian, J., et al.: Dynamic integrity measurement model based on vTPM. Chin. Commun. 15(2), 88–99 (2018)

    Google Scholar 

  13. Wei, C., Song, S., Hua, W., et al.: Operating systems support for process dynamic integrity measurement. In: IEEE Youth Conference on Information, Computing & Telecommunication. IEEE (2009)

    Google Scholar 

Download references

Acknowledgement

This work is supported by the National Nature Science Foundation of China through project 61972018.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongxu Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cheng, D., Liu, J., Guan, Z., Hu, J. (2020). An Attack-Immune Trusted Architecture for Supervisory Intelligent Terminal. In: Qiu, M. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2020. Lecture Notes in Computer Science(), vol 12454. Springer, Cham. https://doi.org/10.1007/978-3-030-60248-2_10

Download citation

Publish with us

Policies and ethics