Implementation Aspects of Mobile and Embedded Trusted Computing
- Cite this paper as:
- Dietrich K., Winter J. (2009) Implementation Aspects of Mobile and Embedded Trusted Computing. In: Chen L., Mitchell C.J., Martin A. (eds) Trusted Computing. Trust 2009. Lecture Notes in Computer Science, vol 5471. Springer, Berlin, Heidelberg
Nowadays, trusted platform modules (TPMs) are usually deployed together with desktop PCs and notebooks. However, these platforms are not the only ones that can host TPMs. Mobile and embedded platforms like cell phones can also host TPMs but may have different requirements and different use-case scenarios. In contrast to common TPMs, TPMs for mobile platforms do not need to be implemented as micro controllers, leading to different security assumptions. In order to find these differences, we have designed and implemented two approaches for mobile TPMs that are analyzed in detail in the context of this paper.
KeywordsMobile Trusted Computing MTMs ARM TrustZone Secure Element JavaCard
Unable to display preview. Download preview PDF.