Implementation Aspects of Mobile and Embedded Trusted Computing

  • Kurt Dietrich
  • Johannes Winter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5471)

Abstract

Nowadays, trusted platform modules (TPMs) are usually deployed together with desktop PCs and notebooks. However, these platforms are not the only ones that can host TPMs. Mobile and embedded platforms like cell phones can also host TPMs but may have different requirements and different use-case scenarios. In contrast to common TPMs, TPMs for mobile platforms do not need to be implemented as micro controllers, leading to different security assumptions. In order to find these differences, we have designed and implemented two approaches for mobile TPMs that are analyzed in detail in the context of this paper.

Keywords

Mobile Trusted Computing MTMs ARM TrustZone Secure Element JavaCard 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alves, T., Felton, D.: TrustZone: Integrated Hardware and Software Security - Enabling Trusted Computing in Embedded Systems (July 2004), http://www.arm.com/pdfs/TZ_Whitepaper.pdf
  2. 2.
    ARM Ltd. TrustZone Technology Overview. Introduction, http://www.arm.com/products/esd/trustzone_home.html
  3. 3.
    Dietrich, K.: An integrated architecture for trusted computing for java enabled embedded devices. In: STC 2007: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pp. 2–6. ACM, New York (2007)CrossRefGoogle Scholar
  4. 4.
    Ekberg, J.-E., Asokan, N., Kostiainen, K., Rantala, A.: Scheduling execution of credentials in constrained secure environments. In: STC 2008: Proceedings of the 3rd ACM workshop on Scalable trusted computing, pp. 61–70. ACM, New York (2008)Google Scholar
  5. 5.
    Trusted Computing Group Mobile Working Group. TCG Mobile Reference Architecture Version 1.0 Revision 1. Specification (June 12, 2007), http://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-reference-architecture-1.0.pdf
  6. 6.
    Trusted Computing Group Mobile Working Group. TCG Mobile Trusted Module Sepecification Version 1 rev. 1.0. Specification (June 12, 2007), https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf
  7. 7.
    Trusted Computing Group TPM Working Group. TPM Main Part 1 Design Principles. Specification, Specification version 1.2 Level 2 Revision 103 (July 9, 2007), https://www.trustedcomputinggroup.org/specs/TPM/mainP1DPrev103.zip
  8. 8.
    Trusted Computing Group TPM Working Group. TPM Main Part 3 Commands. Specification, Specification version 1.2 Level 2 Revision 103 (July 9, 2007), https://www.trustedcomputinggroup.org/specs/TPM/mainP3Commandsrev103.zip
  9. 9.
    International Organisation for Standardisation. ISO/IEC 7816-4, Part 4: Interindustry commands for interchange (2005)Google Scholar
  10. 10.
    Kylänpää, M., Ekberg, J.-E.: Mobile Trusted Module (MTM) - an introduction (November 14 (2007), http://research.nokia.com/files/NRCTR2007015.pdf
  11. 11.
    Open Kernel Labs. OKL4 microkernel source code, release 1.5.2., http://wiki.ok-labs.com/images/2/20/Okl4_release_1.5.2.tar.gz
  12. 12.
    Lindholm, T., Yellin F.: The Java Virtual Machine Specification. Second Edition, http://java.sun.com/docs/books/jvms/second_edition/html/VMSpecTOC.doc.html
  13. 13.
    Sun Microsystems. Java Card Technology. Overview, http://java.sun.com/products/javacard/
  14. 14.
    SUN Microsystems. Java Card Platform Specification 2.2.2. Specification (March 2006), http://java.sun.com/products/javacard/specs.html
  15. 15.
    Microsoft Research. Singularity (2008)Google Scholar
  16. 16.
    Strasser, M.: TPM Emulator. Software package, http://tpm-emulator.berlios.de/
  17. 17.
    SUN. Javacard protection profile (May 2006)Google Scholar
  18. 18.
    Winter, J.: Trusted computing building blocks for embedded linux-based arm trustzone platforms. In: STC 2008: Proceedings of the 3rd ACM workshop on Scalable trusted computing, pp. 21–30. ACM, New York (2008)Google Scholar
  19. 19.
    XEN Hypervisor, http://xen.org/
  20. 20.
    Zhang, X., Aciicmez, O., Seifert, J.-P.: A trusted mobile phone reference architecture via secure kernel. In: STC 2007: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pp. 7–14. ACM, New York (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Kurt Dietrich
    • 1
  • Johannes Winter
    • 1
  1. 1.Institute for Applied Information Processing and CommunicationsGrazAustria

Personalised recommendations