To deal with continuing security threats, developers of ARM-based mobile and embedded Internet of Things designs will need to complement their software protections with hardware solutions such as ARM TrustZone and other trusted execution environment alternatives.
As platform-oriented-architecture-based devices incorporate the product feature and service configuration and management the need to secure them and the systems they support makes a hardware-based “root of trust” a critical requirement.
How to make network connected processors secure by implementing hardware support for instruction-set randomization (ISR), thus providing a unique random Instruction Set Architecture (ISA) for every deployed system.
Implementation and evaluation of the root of trust for the Trusted ExecutionEnvironment (TEE) provided by ARM TrustZone but using SRAM Physical Unclonable Functions (PUFs).
Merging the Trusted Computing Group approach to securing connected processors with ARM TrustZone technology in order to build an open Linux-based embedded trusted computing platform.
A comparison of the use of the hardware- based ARM TrustZone versus the Intel/AMD Trusted Execution Environment in two-factor authentication applications.
Building an ARM trusted execution environment that works across multiple wireless and mobile connected devices using the open source webinos operating system and open source node.js, a Javascript- based open source cross-platform runtime environment.
Operation of Trusted Cells, an ARM Trustzone based set of personal data servers that can run on smartphones, setop boxes, portable tokens or smart cards.
A trustful infrastructure for the Internet of Things based on a second generation EPOSMote, which features an ARM processor and an IEEE 802.15.4 radio transceiver.
An embedded security implementation based on a 32-bit ARM11 processor and its Trustzone features to enhance the integrity of the sensor node platforms.
The design and implementation of a proposed Android Security Modules (ASM) framework, which provides a programmable interface for defining new reference monitors for Linux OS.
A systematic analysis of the interplay among the different layers of Android to provide a simple security model of the interaction among the components of the Android Security Framework.
You must verify your email address before signing in. Check your email for your verification email, or enter your email address in the form below to resend the email.
Please confirm the information below before signing in.
{* #socialRegistrationForm *}
{* firstName *}
{* lastName *}
{* displayName *}
{* emailAddress *}
By clicking "Sign In", you confirm that you accept our terms of service and have read and understand privacy policy.
{* /socialRegistrationForm *}
Almost Done
Please confirm the information below before signing in. Already have an account? Sign In.