TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications

  • Wei Feng
  • Dengguo Feng
  • Ge Wei
  • Yu Qin
  • Qianying Zhang
  • Dexian Chang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7904)


Trusted Computing (TC) can improve the security of various computing platforms. However, as new computing devices emerge and application scenarios increase, current trusted computing technology cannot satisfy various new demands. For example, mobile and embedded platforms may lack security components of trusted computing, users may need a portable trusted module[13] for multiple desktop machines, and users may hope to customize their own security features for new applications. This paper presents TEEM, a system that achieves these demands by designing a mobile-based portable TC module. TEEM is built on the general mobile devices of users, and its running environment can be protected by the secure features of embedded CPUs. For desktop machines, the mobile device with TEEM can act as a trusted computing module with USB bus. Finally, we have implemented TEEM using an ARM SoC platform and evaluated the performance of TEEM.


Mobile Device Trusted Platform Module Elliptic Curve Cryptography Trust Computing Desktop Machine 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Trusted Computing Group. Trusted platform module main specification. Version 1.2, Revision 103 (2007)Google Scholar
  2. 2.
    State Cryptography Administration. Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing (2007)Google Scholar
  3. 3.
    Feng, D., Qin, Y.: Research on Attestation Method for Trust Computing Environment. Chinese Journal of Computers (2008)Google Scholar
  4. 4.
    Feng, D., Qin, Y.: A property-based attestation protocol for TCM. Science China Information Sciences (March 2010)Google Scholar
  5. 5.
    Azema, J., Fayad, G.: M-Shield mobile security: Makeing wireless secure. Texas Instruments WhitePaper (June 2008)Google Scholar
  6. 6.
    ARM Limited. ARM Security Technology: Building a Secure System using TrustZone Technology. ARM Technical White Paper (2009)Google Scholar
  7. 7.
    TCG Mobile Phone Working Group. TCG mobile trusted module specification. Version 1.0, Revision 7.02 (April 2010)Google Scholar
  8. 8.
    Tate, S.R., Vishwanathan, R.: General Secure Function Evaluation using standard trusted computing hardware. In: PST 2011: International Conference on Privacy, Security and Trust, July 19-21, pp. 221–228 (2011)Google Scholar
  9. 9.
    Aaraj, N., Raghunathan, A., Ravi, S., Jha, A.K.: Energy and Execution Time Analysis of a Software-based Trusted Platform Module. In: Proceedings of the Conference on Design, Automation and Test in Europe. IEEE (2007)Google Scholar
  10. 10.
    Trusted Computing Group. Trusted Platform Module Library Part 1-4, Family ”2.0” Level 00 Revision 00.93Google Scholar
  11. 11.
  12. 12.
    Intel. Mobile Platform Vision Guide for 2003 (September 2002)Google Scholar
  13. 13.
    Zhang, D., Han, Z., Yan, G.: A Portable TPM Based on USB Key. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, New York, NY, USA (2010)Google Scholar
  14. 14.
    Nepal, S., Zic, J., Liu, D., Jang, J.: Trusted Computing Platform in Your Pocket. In: EUC 2010: Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 812–817. IEEE Computer Society, Washington, DC (2010)CrossRefGoogle Scholar
  15. 15.
    Strasser, M.: TPM Emulator,
  16. 16.
    Software TPM Introduction(IBM),
  17. 17.
    Vasudevan, A., Owusu, E., Zhou, Z., Newsome, J., McCune, J.M.: Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 159–178. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  18. 18.
    Winter, J.: Trusted computing building blocks for embedded linux-based ARM trustzone platforms. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia, USA, October 31 (2008)Google Scholar
  19. 19.
    Dietrich, K.: An integrated architecture for trusted computing for java enabled embedded devices. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia, USA, November 02 (2007)Google Scholar
  20. 20.
    Ekberg, J.-E., Bugiel, S.: Trust in a small package: minimized MRTM software implementation for mobile secure environments. In: STC 2009: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, ACM, NY (2009)Google Scholar
  21. 21.
    Chen, L., Ryan, M.: Attack, solution and verification for shared authorisation data in TCG TPM. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 201–216. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  22. 22.
    Santos, N., Raj, H., Saroiu, S., Wolman, A.: Trusted language runtime (TLR): enabling trusted applications on smartphones. In: HotMobile 2011: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, pp. 21–26. ACM, New York (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Wei Feng
    • 1
  • Dengguo Feng
    • 1
  • Ge Wei
    • 2
  • Yu Qin
    • 1
  • Qianying Zhang
    • 1
  • Dexian Chang
    • 1
    • 3
  1. 1.Institute of SoftwareChinese Academy of SciencesChina
  2. 2.GUANGDONG KAMFU Information & Technology CO., LTDChina
  3. 3.Zhengzhou Institute of Information Science and TechnologyChina

Personalised recommendations