The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Arm Hypervisor and Trustzone Alternatives
|
Author(s): Nezer Jacob Zaidenberg (College of Management, Israel), Raz Ben Yehuda (University of Jyväskylä, Finland)and Roee Shimon Leon (University of Jyväskylä, Finland)
Copyright: 2020
Pages: 13
Source title:
Encyclopedia of Criminal Activities and the Deep Web
Source Author(s)/Editor(s): Mehdi Khosrow-Pour D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-5225-9715-5.ch079
Purchase
|
Abstract
Many scenarios such as DRM, payments, and homeland security require a trusted and verified trusted execution environment (TEE) on ARM. In most cases such TEE should be available in source code mode. The vendor cannot conduct code review and ensure that the operating system is trustworthy unless source code is available. Android and other rich execution environments (REEs) support various TEE implementations. Each TEE implementation has its own unique way of deploying trusted applications and features. Most TEEs in ARM can be started at TrustZone™ or Hyp (Hypervisor) mode. Choosing a proper TEE operating system can be a problem for trusted application developers and hardware vendors. This article discuss the hypervisor vs. TrustZone™ implementation dilemma. Furthermore, the article surveys multiple ARM TrustZone™ TEE solutions and ARM virtualization solutions that are available today with source code. This article allows IoT vendors and SoC manufacturer to select a suitable TEE for their platform needs based on their criteria.
Related Content
Sílvia Ribeiro.
© 2024.
24 pages.
|
Bárbara Machado, Sónia Maria Martins Caridade.
© 2024.
21 pages.
|
Gabriela Mesquita Borges.
© 2024.
20 pages.
|
Gabriela Mesquita Borges.
© 2024.
33 pages.
|
Nathália Castro da Silva, Rita Faria.
© 2024.
25 pages.
|
Joana Torres, Jorge Gracia Ibáñez, Sónia Maria Martins Caridade.
© 2024.
22 pages.
|
Camila Iglesias.
© 2024.
12 pages.
|
|
|