skip to main content
10.1145/1456455.1456465acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Scheduling execution of credentials in constrained secure environments

Published: 31 October 2008 Publication History

Abstract

A new inexpensive approach for using credentials in a secure manner has become available due to the fact that several types of general-purpose secure hardware, like TPMs, Mshield and ARM TrustZone are becoming widely deployed. These technologies still have limitations, one being the limited on-chip secure memory which leads to severe size constraints for credentials that need to execute in secure memories. In this paper, we describe, in the context of a credential provisioning and execution architecture we call On-board Credentials (ObC), a secure scheduling mechanism for overcoming some of the size constraints imposed for the virtual credentials implemented on ObC.

References

[1]
ARM. TrustZone-enabled processor. http://www.arm.com/pdfs/DDI0301D_arm1176jzfs_r0p2_trm.pdf.
[2]
Jan-Erik Ekberg et al. On-board Credentials with Open Provisioning, draft paper 2008. Technical Report NRC-TR-2008-007, Nokia Research Center, August 2008. http://research.nokia.com/files/NRCTR2008007.pdf
[3]
Jan-Erik Ekberg et al. Onboard credentials platform: Design and implementation. Technical Report NRC-TR-2008-001, Nokia Research Center, January 2008. http://research.nokia.com/files/NRCTR2008001.pdf.
[4]
Jan-Erik Ekberg and Markku Kylanpaa. Mobile trusted module. Technical Report NRC-TR-2007-015, Nokia Research Center, November 2007. http://research.nokia.com/files/NRCTR2007015.pdf.
[5]
John Franks et al. HTTP Authentication: Basic and Digest Access Authentication. Technical Report RFC 2617, IETF, June 1999.
[6]
The Programming Language Lua. http://www.lua.org/.
[7]
Jay Srage and Jerome Azema. M-Shield mobile security technology, 2005. TI White paper. http://focus.ti.com/pdfs/wtbu/ti_mshield_whitepaper.pdf.
[8]
Harini Sundaresan. OMAP platform security features, July 2003. TI White paper. http://focus.ti.com/pdfs/vf/wireless/platformsecuritywp.pdf.
[9]
Trusted Computing Group. https://www.trustedcomputinggroup.org/home.
[10]
Trusted Platform Module (TPM) Specifications. https://www.trustedcomputinggroup.org/specs/TPM/.

Cited By

View all
  • (2023)SoK: A Systematic Review of TEE Usage for Developing Trusted ApplicationsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600169(1-15)Online publication date: 29-Aug-2023
  • (2018)Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform2018 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP.2018.00021(183-198)Online publication date: Apr-2018
  • (2016)Light-SPDProceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing10.1145/2940343.2940349(11-20)Online publication date: 5-Jul-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STC '08: Proceedings of the 3rd ACM workshop on Scalable trusted computing
October 2008
100 pages
ISBN:9781605582955
DOI:10.1145/1456455
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 October 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. onboard credentials
  2. scheduling
  3. secure execution environments
  4. trusted hardware

Qualifiers

  • Research-article

Conference

CCS08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 17 of 31 submissions, 55%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)SoK: A Systematic Review of TEE Usage for Developing Trusted ApplicationsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600169(1-15)Online publication date: 29-Aug-2023
  • (2018)Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform2018 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP.2018.00021(183-198)Online publication date: Apr-2018
  • (2016)Light-SPDProceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing10.1145/2940343.2940349(11-20)Online publication date: 5-Jul-2016
  • (2016)Secure Identification of Actively Executed Code on a Generic Trusted Component2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN.2016.45(419-430)Online publication date: Jun-2016
  • (2014)Trust Management and Its ChallengesTrust Management in Mobile Environments10.4018/978-1-4666-4765-7.ch003(31-52)Online publication date: 2014
  • (2014)Multi-tiered Security Architecture for ARM via the Virtualization and Security ExtensionsProceedings of the 2014 International Semiconductor Laser Conference10.1109/DEXA.2014.68(308-312)Online publication date: 7-Sep-2014
  • (2012)Experimenting with ARM TrustZone -- OrProceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2012.157(1161-1166)Online publication date: 25-Jun-2012
  • (2012)Trustworthy execution on mobile devicesProceedings of the 5th international conference on Trust and Trustworthy Computing10.1007/978-3-642-30921-2_10(159-178)Online publication date: 13-Jun-2012
  • (2011)A flexible software development and emulation framework for ARM trustzoneProceedings of the Third international conference on Trusted Systems10.1007/978-3-642-32298-3_1(1-15)Online publication date: 27-Nov-2011
  • (2010)Mobile Trusted Computing Based on MTMInternational Journal of Dependable and Trustworthy Information Systems10.4018/jdtis.20101001021:4(25-42)Online publication date: 1-Oct-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media