File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

문현곤

Moon, Hyungon
Computer Systems Security Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.number 2 -
dc.citation.title IEEE TRANSACTIONS ON MOBILE COMPUTING -
dc.citation.volume 22 -
dc.contributor.author Hwang, Dongil -
dc.contributor.author Yeleuov, Sanzhar -
dc.contributor.author Seo, Jiwon -
dc.contributor.author Chung, Minu -
dc.contributor.author Moon, Hyungon -
dc.contributor.author Paek, Yunheung -
dc.date.accessioned 2023-12-21T13:07:55Z -
dc.date.available 2023-12-21T13:07:55Z -
dc.date.created 2021-08-12 -
dc.date.issued 2023-02 -
dc.description.abstract Many mobile systems run on ARM-based devices today. People use these for increasingly diverse yet security-sensitive applications. ARM has adopted a security model to tackle this threat, where they manage private information in an isolated trusted execution environment (TEE) provided by TrustZone. This TrustZone-based model has been proven effective, but due to security concerns, it is available solely for the vendors applications, thereby hindering the broad use of TrustZone. Consequently, we propose a runtime framework backed by TrustZone to construct a secondary TEE. AMBASSY has its residence built on an on-chip field-programmable gate array (FPGA), which is a standard component in an ARM/FPGA hybrid system readily available on the market today. This study, to the best of our knowledge, is the first attempt to broaden the use of TrustZone by using an FPGA to build a secondary TEE for arbitrary third-parties, which otherwise should be expelled to the Normal World. This paper describes many design challenges that we have overcome to fully implement AMBASSY on an FPGA. Our experiments demonstrate the practicality of AMBASSY by presenting the security analysis and performance results of third-party application samples. The samples all run safely on AMBASSY, with shorter execution time than regular TEE applications in TrustZone (by a factor of 5.552). -
dc.identifier.bibliographicCitation IEEE TRANSACTIONS ON MOBILE COMPUTING, v.22, no.2 -
dc.identifier.doi 10.1109/TMC.2021.3086143 -
dc.identifier.issn 1536-1233 -
dc.identifier.scopusid 2-s2.0-85107344726 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/53437 -
dc.identifier.url https://ieeexplore.ieee.org/document/9446637 -
dc.identifier.wosid 000965387600001 -
dc.language 영어 -
dc.publisher Institute of Electrical and Electronics Engineers -
dc.title Ambassy: A Runtime Framework to Delegate Trusted Applications in an ARM/FPGA Hybrid System -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.relation.journalWebOfScienceCategory Computer Science, Information Systems;Telecommunications -
dc.relation.journalResearchArea Computer Science;Telecommunications -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Security -
dc.subject.keywordAuthor Field programmable gate arrays -
dc.subject.keywordAuthor Software -
dc.subject.keywordAuthor Mobile computing -
dc.subject.keywordAuthor Hardware -
dc.subject.keywordAuthor System-on-chip -
dc.subject.keywordAuthor Task analysis -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.