메뉴 건너뛰기




Volumn , Issue , 2015, Pages

SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment

Author keywords

[No Author keywords available]

Indexed keywords

SECURE COMMUNICATION;

EID: 85128201272     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2015.23189     Document Type: Conference Paper
Times cited : (98)

References (38)
  • 1
    • 84947089277 scopus 로고    scopus 로고
    • Architecture reference manual (armv7-a and armv7-r edition)
    • “Architecture reference manual (armv7-a and armv7-r edition), ” ARM DDI C, vol. 406, 2008.
    • (2008) ARM DDI C , vol.406
  • 2
    • 85162730360 scopus 로고    scopus 로고
    • April [Online]. Available
    • “cve-2013-3051, ” April 2013. [Online]. Available: http://www.cvedetails.com/cve/CVE-2013-3051/
    • (2013) cve-2013-3051
  • 3
    • 84912100809 scopus 로고    scopus 로고
    • April [Online]. Available
    • “Unlocking the motorola bootloader, ” April 2013. [Online]. Available: http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html
    • (2013) Unlocking the motorola bootloader
  • 4
    • 85180547617 scopus 로고    scopus 로고
    • June [Online]. Available
    • “Arm fastmodels, ” June 2014. [Online]. Available: http://www.arm.com/products/tools/models/fast-models/
    • (2014) Arm fastmodels
  • 5
    • 84921503959 scopus 로고    scopus 로고
    • Tech. Rep., June [Online]. Available
    • “Arm security technology: Building a secure system using trustzone technology, ” Tech. Rep., June 2014. [Online]. Available: http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf
    • (2014) Arm security technology: Building a secure system using trustzone technology
  • 6
    • 85180553092 scopus 로고    scopus 로고
    • June [Online]. Available
    • “Arndale board, ” June 2014. [Online]. Available: http://www.arndaleboard.org/wiki/index.php/Main_Page
    • (2014) Arndale board
  • 7
    • 85180549310 scopus 로고    scopus 로고
    • June [Online]. Available
    • “Discretix, ” June 2014. [Online]. Available: http://www.discretix.com/products-solutions
    • (2014) Discretix
  • 8
    • 85180552693 scopus 로고    scopus 로고
    • Tech. Rep., June [Online]. Available
    • “Model debugger for fast models, ” Tech. Rep., June 2014. [Online]. Available: http://infocenter.arm.com/help/topic/com.arm.doc.dui0314i/DUI0314I_model_debugger_ug.pdf
    • (2014) Model debugger for fast models
  • 9
    • 85180550119 scopus 로고    scopus 로고
    • June [Online]. Available
    • “Proxama, ” June 2014. [Online]. Available: http://www.proxama.com/products-and-services/trustzone
    • (2014) Proxama
  • 10
    • 85180545731 scopus 로고    scopus 로고
    • June [Online]. Available
    • “Sensepost, ” June 2014. [Online]. Available: http://www.sensepost.com/blog/9114.html
    • (2014) Sensepost
  • 11
    • 85180555329 scopus 로고    scopus 로고
    • June [Online]. Available
    • “Sierraware, ” June 2014. [Online]. Available: http://www.openvirtualization.org/
    • (2014) Sierraware
  • 13
    • 85180549224 scopus 로고    scopus 로고
    • ARM, Tech. Rep., November [Online]. Available
    • ARM, “Procedure call standard for the arm architecture, ” Tech. Rep., November 2012. [Online]. Available: http://infocenter.arm.com/help/topic/com.arm.doc.ihi0042e/IHI0042E_aapcs.pdf
    • (2012) Procedure call standard for the arm architecture
  • 18
    • 84876945112 scopus 로고    scopus 로고
    • Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection
    • IEEE
    • Y. Fu and Z. Lin, “Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection, ” in Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, 2012, pp. 586-600.
    • (2012) Security and Privacy (SP), 2012 IEEE Symposium on , pp. 586-600
    • Fu, Y.1    Lin, Z.2
  • 20
    • 84880127993 scopus 로고    scopus 로고
    • Inktag: secure applications on an untrusted operating system
    • O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel, “Inktag: secure applications on an untrusted operating system, ” ACM SIGPLAN Notices, vol. 48, no. 4, pp. 265-278, 2013.
    • (2013) ACM SIGPLAN Notices , vol.48 , Issue.4 , pp. 265-278
    • Hofmann, O. S.1    Kim, S.2    Dunn, A. M.3    Lee, M. Z.4    Witchel, E.5
  • 23
    • 21644458439 scopus 로고    scopus 로고
    • Implementing an untrusted operating system on trusted hardware
    • ACM
    • D. Lie, C. A. Thekkath, and M. Horowitz, “Implementing an untrusted operating system on trusted hardware, ” in ACM SIGOPS Operating Systems Review, vol. 37, no. 5. ACM, 2003, pp. 178-192.
    • (2003) ACM SIGOPS Operating Systems Review , vol.37 , Issue.5 , pp. 178-192
    • Lie, D.1    Thekkath, C. A.2    Horowitz, M.3
  • 24
    • 84855404052 scopus 로고    scopus 로고
    • Hypervisor support for identifying covertly executing binaries
    • L. Litty, H. A. Lagar-Cavilla, and D. Lie, “Hypervisor support for identifying covertly executing binaries, ” in USENIX Security Symposium, 2008, pp. 243-258.
    • (2008) USENIX Security Symposium , pp. 243-258
    • Litty, L.1    Lagar-Cavilla, H. A.2    Lie, D.3
  • 27
    • 85180548695 scopus 로고    scopus 로고
    • Tech. Rep., June [Online]. Available
    • P. Ning, “Introducing the samsung knox plaform, ” Tech. Rep., June 2014. [Online]. Available: http://samsungdevus.com/sites/Default/files/IntroducingtheSamsungKNOXPlatform-PengNing.pdf
    • (2014) Introducing the samsung knox plaform
    • Ning, P.1
  • 29
    • 77954972405 scopus 로고    scopus 로고
    • Towards application security on untrusted operating systems
    • D. R. Ports and T. Garfinkel, “Towards application security on untrusted operating systems, ” in HotSec, 2008.
    • (2008) HotSec
    • Ports, D. R.1    Garfinkel, T.2
  • 30
    • 85180553589 scopus 로고    scopus 로고
    • L. Samsung Electronics Co., Tech. Rep., June [Online]. Available
    • L. Samsung Electronics Co., “White paper: An overview of samsung knox, ” Tech. Rep., June 2014. [Online]. Available: http://www.samsung.com/my/business-images/resource/white-paper/2013/11/Samsung_KNOX_whitepaper_An_Overview_of_Samsung_KNOX-0.pdf
    • (2014) White paper: An overview of samsung knox
  • 32
    • 41149103393 scopus 로고    scopus 로고
    • Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
    • A. Seshadri, M. Luk, N. Qu, and A. Perrig, “Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses, ” ACM SIGOPS Operating Systems Review, vol. 41, no. 6, pp. 335-350, 2007.
    • (2007) ACM SIGOPS Operating Systems Review , vol.41 , Issue.6 , pp. 335-350
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 35
    • 84867864575 scopus 로고    scopus 로고
    • Efficient monitoring of untrusted kernel-mode execution
    • A. Srivastava and J. T. Giffin, “Efficient monitoring of untrusted kernel-mode execution.” in NDSS, 2011.
    • (2011) NDSS
    • Srivastava, A.1    Giffin, J. T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.