A flexible software development and emulation framework for ARM TrustZone

Paul Wiegele, Johannes Winter, Martin Pirker, Ronald Tögl

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

ARM TrustZone is a hardware isolation mechanism to improve software security. Despite its widespread availability in mobile and embedded devices, development of software for it has been hampered by a lack of openly available emulation and development frameworks. In this paper we provide a comprehensive open-source software environment for experiments with ARM TrustZone, based on the foundations of the well known open-source QEMU platform emulator. Our software framework is complemented by a prototype kernel running within a trusted environment. We validate our software environment with an application example featuring a software based Trusted Platform Module hosted in a TrustZone protected runtime environment and an Android operating system accessing it through an high-level, industry-standard Trusted Computing API.
Original languageEnglish
Title of host publicationTrusted systems : third international conference, INTRUST 2011
Subtitle of host publicationrevised selected papers
Place of PublicationBerlin Heidelberg
PublisherSpringer
Pages1-15
Volume7222
ISBN (Print)978-3-642-32297-6
Publication statusPublished - 2012
EventInternational Conference on Trusted Systems - Beijing, China
Duration: 27 Nov 201129 Nov 2011

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Conference

ConferenceInternational Conference on Trusted Systems
Country/TerritoryChina
CityBeijing
Period27/11/1129/11/11

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • Experimental

Fingerprint

Dive into the research topics of 'A flexible software development and emulation framework for ARM TrustZone'. Together they form a unique fingerprint.
  • EU - SEPIA - Secure, Embedded Platform with advanced Process Isolation and Anonymity Capabilities

    Winter, J. (Co-Investigator (CoI)), Dietrich, K. (Co-Investigator (CoI)), Pirker, M. (Co-Investigator (CoI)), Hein, D. (Co-Investigator (CoI)), Bloem, R. (Co-Investigator (CoI)), Tögl, R. (Co-Investigator (CoI)) & Podesser, S. (Co-Investigator (CoI))

    1/06/1031/05/13

    Project: Research project

  • Trusted Computing

    Niederl, A. (Co-Investigator (CoI)), Lipp, P. (Co-Investigator (CoI)), Hein, D. (Co-Investigator (CoI)), Vejda, T. (Co-Investigator (CoI)), Podesser, S. (Co-Investigator (CoI)), Tögl, R. (Co-Investigator (CoI)), Dietrich, K. (Co-Investigator (CoI)), Bratko, H. (Co-Investigator (CoI)), Winter, J. (Co-Investigator (CoI)) & Pirker, M. (Co-Investigator (CoI))

    1/10/0515/07/19

    Project: Research area

Cite this