Presentation 2017-07-15
Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation
Naoki Yoshida, Kazuhiko Fukushima, Shigenori Miyauchi, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) It emerges that the use of security systems which separate device resources into Trusted Execution Environment (TEE) and Rich Execution Environment (REE) by adopting TrustZone supported by ARM microcontrollers. The key idea is to prevent attackers to access to sensitive data by limiting the processing of the sensitive data shall be on TEE while other processing can be done on REE. To evaluate the security of the software architecture of TEE, we implemented an open source TEE, OP-TEE, on a SoC for automobile and several test applications. Our conclusion is that even if we use sensitive data only within TEE the data can be compromised if Trusted Application (TA) run on TEE contains some vulnerabilities.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Trusted Execution Environment / TrustZone / OP-TEE / ARM / GlobalPlatform
Paper # ISEC2017-36,SITE2017-28,ICSS2017-35,EMM2017-39
Date of Issue 2017-07-07 (ISEC, SITE, ICSS, EMM)

Conference Information
Committee SITE / EMM / ISEC / ICSS / IPSJ-CSEC / IPSJ-SPT
Conference Date 2017/7/14(2days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair Hitoshi Okada(NII) / Keiichi Iwamura(TUC) / Kazuto Ogawa(NHK) / Yoshiaki Shiraishi(Kobe Univ.)
Vice Chair Tetsuya Morizumi(Kanagawa Univ.) / Masaru Ogawa(Kobe Gakuin Univ.) / Hirohisa Hioki(Kyoto Univ.) / Minoru Kuribayashi(Okayama Univ.) / Atsushi Fujioka(Kanagawa Univ.) / Shiho Moriai(NICT) / Takeshi Ueda(Mitsubishi Electric) / Hiroki Takakura(NII)
Secretary Tetsuya Morizumi(Gifu Shotoku Gakuen Univ.) / Masaru Ogawa(Tokyo Univ. of the Arts) / Hirohisa Hioki(Shizuoka Univ.) / Minoru Kuribayashi(Tokyo Metropolitan Univ.) / Atsushi Fujioka(Tohoku Univ.) / Shiho Moriai(Tokai Univ.) / Takeshi Ueda(Yokohama National Univ.) / Hiroki Takakura(NTT)
Assistant Akiyoshi Kabeya(Chiba Univ.) / Hisanori Kato(KDDI) / Kan Hyonho(NIT, Tokyo) / Harumi Murata(Tyukyo Univ.) / Keita Emura(NICT) / Yuichi Komano(TOSHIBA) / Yuuji Suga(IIJ) / Takahiro Kasama(NICT) / Akira Yamada(KDDI labs.)

Paper Information
Registration To Technical Committee on Social Implications of Technology and Information Ethics / Technical Committee on Enriched MultiMedia / Technical Committee on Information Security / Technical Committee on Information and Communication System Security / Special Interest Group on Computer Security / Special Interest Group on Security Psychology and Trust
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation
Sub Title (in English)
Keyword(1) Trusted Execution Environment
Keyword(2) TrustZone
Keyword(3) OP-TEE
Keyword(4) ARM
Keyword(5) GlobalPlatform
1st Author's Name Naoki Yoshida
1st Author's Affiliation Yokohama National University(YNU)
2nd Author's Name Kazuhiko Fukushima
2nd Author's Affiliation Renesas Electronics Corporation(Renesas Electronics)
3rd Author's Name Shigenori Miyauchi
3rd Author's Affiliation Renesas Electronics Corporation(Renesas Electronics)
4th Author's Name Junichi Sakamoto
4th Author's Affiliation Yokohama National University(YNU)
5th Author's Name Daisuke Fujimoto
5th Author's Affiliation Yokohama National University(YNU)
6th Author's Name Tsutomu Matsumoto
6th Author's Affiliation Yokohama National University(YNU)
Date 2017-07-15
Paper # ISEC2017-36,SITE2017-28,ICSS2017-35,EMM2017-39
Volume (vol) vol.117
Number (no) ISEC-125,SITE-126,ICSS-127,EMM-128
Page pp.pp.267-274(ISEC), pp.267-274(SITE), pp.267-274(ICSS), pp.267-274(EMM),
#Pages 8
Date of Issue 2017-07-07 (ISEC, SITE, ICSS, EMM)