Publication | Closed Access
Building trusted path on untrusted device drivers for mobile devices
73
Citations
11
References
2014
Year
Unknown Venue
Mobile SecurityEngineeringInformation SecurityMobile DevicesHardware SecurityTrusted Execution EnvironmentHardware Security SolutionTrustMobile MalwareMobile ComputingComputer ScienceDevice DriverData SecurityCryptographyTrustworthy ComputingTrusted PlatformArtsTrusted PathCooperative Randomization
Mobile devices are frequently used as terminals to interact with many security-critical services such as mobile payment and online banking. However, the large client software stack and the continuous proliferation of malware expose such interaction under various threats, including passive attacks like phishing and active ones like direct code manipulation. This paper proposes TrustUI, a new trusted path design for mobile devices that enables secure interaction between end users and services based on ARM's TrustZone technology. TrustUI is built with a combination of key techniques including cooperative randomization of the trusted path and secure delegation of network interaction. With such techniques, TrustUI not only requires no trust of the commodity software stack, but also takes a step further by excluding drivers for user-interacting devices like touch screen from its trusted computing base (TCB). Hence, TrustUI has a much smaller TCB, requires no access to device driver code, and may easily adapt to many devices. A prototype of TrustUI has been implemented on a Samsung Exynos 4412 board and evaluation shows that TrustUI provides strong protection of users interaction.
| Year | Citations | |
|---|---|---|
Page 1
Page 1