An Enclave-based TEE for SE-in-SoC in RISC-V Industry

08/07/2022
by   Xuanle Ren, et al.
0

Secure Element (SE) in SoC sees an increasing adoption in industry. Many applications in IoT devices are bound to the SE because it provides strong cryptographic functions and physical protection. Though SE-in-SoC provides strong proven isolation for software programs, it also brings more design complexity and higher cost to PCB board building. More, SE-in-SoC may still have security concerns, such as malware installation and user impersonation. In this work, we employ TEE, a hardware-backed security technique, for protecting SE-in-SoC and RISCV. In particular, we construct various enclaves for isolating applications and manipulating the SE, with the inherently-secure primitives provided by RISC-V. Using hardware and software co-design, the solution ensures trusted execution and secure communication among applications. The security of SE is further protected by enforcing the SE to be controlled by a trusted enclave and making the RISC-V core resilient to side-channel attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/27/2022

EBAKE-SE: A Novel ECC Based Authenticated Key Exchange between Industrial IoT Devices using Secure Element

Industrial IoT (IIoT) aims to enhance services provided by various indus...
research
05/04/2023

Enhancing IoT Security and Privacy with Trusted Execution Environments and Machine Learning

With the increasing popularity of Internet of Things (IoT) devices, secu...
research
09/01/2023

Security Verification of Low-Trust Architectures

Low-trust architectures work on, from the viewpoint of software, always-...
research
12/11/2020

Towards Secure and Leak-Free Workflows Using Microservice Isolation

Data leaks and breaches are on the rise. They result in huge losses of m...
research
05/20/2019

simTPM: User-centric TPM for Mobile Devices (Technical Report)

Trusted Platform Modules are valuable building blocks for security solut...
research
05/25/2022

SoK: Hardware-supported Trusted Execution Environments

The growing complexity of modern computing platforms and the need for st...
research
09/22/2019

Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations

Hardware Trojans have drawn the attention of academia, industry and gove...

Please sign up or login with your details

Forgot password? Click here to reset