Show/Hide Menu
Hide/Show Apps
anonymousUser
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Açık Bilim Politikası
Açık Bilim Politikası
Frequently Asked Questions
Frequently Asked Questions
Browse
Browse
By Issue Date
By Issue Date
Authors
Authors
Titles
Titles
Subjects
Subjects
Communities & Collections
Communities & Collections
Open-TEE is No Longer Virtual: Towards Software-only Trusted Execution Environments Using White-box Cryptography
Date
2019-01-01
Author
BIÇAKCI, KEMAL
Ak, Ihsan Kagan
Ozdemir, Betul Askin
Gozutok, Mesut
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
29
views
0
downloads
Trusted Execution Environments (TEEs) provide hardware support to isolate the execution of sensitive operations on mobile phones for improved security. However, they are not always available to use for application developers. To provide a consistent user experience to those who have and do not have a TEE-enabled device, we could get help from Open-TEE, an open-source GlobalPlatform (GP)-compliant software TEE emulator. However, Open-TEE does not offer any of the security properties hardware TEEs have. In this paper, we propose WhiteBox-TEE which integrates white-box cryptography with Open-TEE to provide better security while still remaining complaint with GP TEE specifications. We discuss the architecture, provisioning mechanism, implementation highlights, security properties and performance issues of WhiteBox-TEE and propose possible revisions to TEE specifications to have better use of white-box cryptography in software-only TEEs.
Subject Keywords
Trusted execution environment
,
White-box cryptography
,
Open-TEE
,
Secure storage
,
SPACE algorithm
URI
https://hdl.handle.net/11511/67497
DOI
https://doi.org/10.1109/tps-isa48467.2019.00029
Collections
Graduate School of Applied Mathematics, Conference / Seminar