On Making Emerging Trusted Execution Environments Accessible to Developers

  • Thomas NymanEmail author
  • Brian McGillion
  • N. Asokan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9229)


New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions. But each new TEE environment comes with its own set of interfaces and programming paradigms, thus raising the barrier for entry for developers who want to make use of these TEEs. In this paper, we motivate the need for realizing standard TEE interfaces on such emerging TEE architectures and show that this exercise is not straightforward. We report on our on-going work in mapping GlobalPlatform standard interfaces to TrustLite and SGX.


Trusted Execution Environment (TEE) Intel SGX GlobalPlatform (GP) Enclave Mode Security Tasks 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    ARM Security Technology - Building a Secure System using TrustZone Technology (2009).
  2. 2.
    Brasser, F., et al.: TyTAN: tiny trust anchor for tiny devices. In: 52nd Design Automation Conference (DAC) June 2015Google Scholar
  3. 3.
    Ekberg, J., Kostiainen, K., Asokan, N.: The untapped potential of trusted execution environments on mobile devices. IEEE Secur. Priv. 12(4), 29–37 (2014). CrossRefGoogle Scholar
  4. 4.
    Eldefrawy, K., Tsudik, G., Francillon, A., Perito, D.: SMART: secure and minimal architecture for (establishing dynamic) root of trust. In: 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5–8 (2012). The Internet Society (2012).
  5. 5.
    GlobalPlatform: Device specifications for trusted execution environment.
  6. 6.
    Intel: Software Guard Extensions Programming Reference (2013).
  7. 7.
    Koeberl, P., Schulz, S., Sadeghi, A.R., Varadharajan, V.: TrustLite: a security architecture for tiny embedded devices. In: Proceedings of the Ninth European Conference on Computer Systems, pp. 10:1–10:14. EuroSys 2014. ACM, New York, NY, USA (2014).
  8. 8.
  9. 9.
    McGillion, B., Dettenborn, T., Nyman, T., Asokan, N.: Open-TEE - an open virtual trusted execution environment. Technical report. Aalto University (2015).
  10. 10.
    McKeen, F., et al.: Innovative instructions and software model for isolated execution. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, pp. 10:1–10:1. HASP 2013. ACM, New York, NY, USA (2013).
  11. 11.

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at Aalto UniversityEspooFinland
  2. 2.Aalto UniversityEspooFinland
  3. 3.University of HelsinkiHelsinkiFinland

Personalised recommendations