Open-TEE is No Longer Virtual: Towards Software-only Trusted Execution Environments Using White-box Cryptography

2019-01-01
BIÇAKCI, KEMAL
Ak, Ihsan Kagan
Ozdemir, Betul Askin
Gozutok, Mesut
Trusted Execution Environments (TEEs) provide hardware support to isolate the execution of sensitive operations on mobile phones for improved security. However, they are not always available to use for application developers. To provide a consistent user experience to those who have and do not have a TEE-enabled device, we could get help from Open-TEE, an open-source GlobalPlatform (GP)-compliant software TEE emulator. However, Open-TEE does not offer any of the security properties hardware TEEs have. In this paper, we propose WhiteBox-TEE which integrates white-box cryptography with Open-TEE to provide better security while still remaining complaint with GP TEE specifications. We discuss the architecture, provisioning mechanism, implementation highlights, security properties and performance issues of WhiteBox-TEE and propose possible revisions to TEE specifications to have better use of white-box cryptography in software-only TEEs.
1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (IEEE TPS-ISA)

Suggestions

A Study on countermeasures on AES against side channel attacks
Çenesiz, Damla; Özbudak, Ferruh; Department of Cryptography (2019)
Side Channel Attacks have a important role for security of cryptographic algorithm. There are different method which include Threshold Implementation to protect against these kind of attacks. In this thesis, we study certain countermeasures to side channel attacks for AES. We start with a survey on Side Channel Attacks for block ciphers and we mentioned attack models for AES.We give also partical attention Treshold Implementation properties and construction methods. We also give some details of subfield con...
Balanced Path Generation and Reliability Extension for In-band Network Telemetry
ŞİMŞEK, GÖKSEL; Onur, Ertan; Alemdar, Hande; Department of Computer Engineering (2021-5)
Network monitoring is one of the key aspects to ensure communication reliability in case of failures and malicious activities and has several design issues depending on the system characteristics. As traditional monitoring solutions usually rely on periodic updates between the network controller and ordinary nodes, scalability re- mains a challenge, especially for large-scale systems. A recent solution, the In-Band Network Telemetry (INT) framework, allows data packets to probe the nodes while traversing th...
PLGAKD: A PUF-based Lightweight Group Authentication and Key Distribution Protocol
Yıldız, Hüsnü; Cenk, Murat; Onur, Ertan (Institute of Electrical and Electronics Engineers (IEEE), 2020-11-01)
Securing Internet of Things (IoT) applications that collect and transport sensitive data by guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing computation and communication overhead of security functions is also a key concern since a large number of constrained devices may take place in such applications. Our main focus in this paper is group authentication and key management in IoT. The existing group authentication and key management protocols in the literature per...
A PUF-based lightweight group authentication and key distribution protocol
Yıldız, Hüsnü; Onur, Ertan; Department of Computer Engineering (2020-9)
Securing Internet of Things (IoT) applications that collect and transport sensitive data by guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing computation and communication overhead of security functions is also a key concern since a large number of constrained devices may take place in such applications. Our main focus in this thesis is group authentication and key management in IoT. The existing group authentication and key management protocols in the literature pe...
Performance evaluation of lightweight cryptographic algorithms for internet of things security
Polat, Selahattin; Baykal, Nazife; Department of Cyber Security (2019)
Widespread deployment of mobile and embedded devices in everyday use has brought up not only new concepts and application areas such as Internet-of-Things (IoT) but also several security and privacy problems. In theory, it is possible to mitigate most of these problems by implementing well-known and standardized security algorithms and techniques on IoT devices. However, in practice, it is rather difficult, if not impossible, to implement standard security algorithms on these devices due to their limited re...
Citation Formats
K. BIÇAKCI, I. K. Ak, B. A. Ozdemir, and M. Gozutok, “Open-TEE is No Longer Virtual: Towards Software-only Trusted Execution Environments Using White-box Cryptography,” Los Angeles, CA, 2019, p. 177, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/67497.