Please enable JavaScript.
Coggle requires JavaScript to display documents.
Trusted Execution environment (solution (feature in TEE (security asset…
Trusted Execution environment
Pattern language
secure booting
solution
force
HW root of trust
Immutable ROM boot
secure store
force
hack one, only leak one
different security level for different content
lv1
Only TEE can access both decrypted content and key
lv2
only TEE can access the key, but REE can access decrypted content
imply: REE can control the key, in the other word, REE got the control permission of key, even REE can't access the key directly.
lv3
REE can access both key and decrypted content
solution
Cryptography
threat modeling
security assert definition
stride method
https://en.wikipedia.org/wiki/STRIDE_(security
)
normal function or feature
abnormal attack model
force
HW isolation mechanism
independent cpu
independent HW
independent memory
HW root of trust
trust chain
root of trusted key
asymmetric public key
unique symmetric device key/id/seed
small code focus on security function only
specifically, only cryptography related feature.
solution
feature in TEE
content protection
movie
music
secure UI
password input
security asset protection
credit card number
password of bank
fingerprint
social security code
we could use TEE to protect security assert in some feautre, especially, the device is rooted.
playback music without content leakage
play movie with content leakage
Launch secure communication with remote trusted server, and protect our security asset even the device is rooted
paymend
money transfer
boot from Trusted ROOT chain
setup the HW firewall before launching linux kernel
launch TEE and perform TEE feature in TEE
context
越來越複雜的軟體系統導致有許多的無法預測的系統安全漏洞, CVE 一年大約有 300~500 個漏洞分別被接露在 iOS, Android, Linux 上, 要期待即時修補這些系統安全性是不現實的
Problem
隔離機密資料, 即使系統被 Root 也要保證資料不洩漏
reference
ARM TBSA
https://developer.arm.com/architectures/security-architectures/platform-security-architecture
global platform
https://globalplatform.org/specs-library/?filter-committee=tee
synopsys BSIMM
https://www.synopsys.com/software-integrity/software-security-services/bsimm-maturity-model.html
Intel TPM
https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-1-Design-Principles_v1.2_rev116_01032011.pdf
True Random number generator
apply solution