Implementation Aspects of Mobile and Embedded Trusted Computing

  • Kurt Dietrich
  • Johannes Winter
Conference paper

DOI: 10.1007/978-3-642-00587-9_3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5471)
Cite this paper as:
Dietrich K., Winter J. (2009) Implementation Aspects of Mobile and Embedded Trusted Computing. In: Chen L., Mitchell C.J., Martin A. (eds) Trusted Computing. Trust 2009. Lecture Notes in Computer Science, vol 5471. Springer, Berlin, Heidelberg

Abstract

Nowadays, trusted platform modules (TPMs) are usually deployed together with desktop PCs and notebooks. However, these platforms are not the only ones that can host TPMs. Mobile and embedded platforms like cell phones can also host TPMs but may have different requirements and different use-case scenarios. In contrast to common TPMs, TPMs for mobile platforms do not need to be implemented as micro controllers, leading to different security assumptions. In order to find these differences, we have designed and implemented two approaches for mobile TPMs that are analyzed in detail in the context of this paper.

Keywords

Mobile Trusted Computing MTMs ARM TrustZone Secure Element JavaCard 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Kurt Dietrich
    • 1
  • Johannes Winter
    • 1
  1. 1.Institute for Applied Information Processing and CommunicationsGrazAustria

Personalised recommendations