TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. Guan, L., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M., & Jaeger, T. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, of MobiSys '17, pages 488–501, New York, NY, USA, 2017. ACM. Paper doi abstract bibtex The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make them smarter. A variety of applications now run simultaneously on an ARM-based processor. For example, devices on the edge of the Internet are provided with higher horsepower to be entrusted with storing, processing and analyzing data collected from IoT devices. This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage. However, commodity OSes are prone to compromise. Once they are exploited, attackers can access the data on these devices. Since the data stored and processed on the devices can be sensitive, left untackled, this is particularly disconcerting. In this paper, we propose a new system, TrustShadow that shields legacy applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. In the secure world, TrustShadow constructs a trusted execution environment for security-critical applications. This trusted environment is maintained by a lightweight runtime system that coordinates the communication between applications and the ordinary OS running in the normal world. The runtime system does not provide system services itself. Rather, it forwards requests for system services to the ordinary OS, and verifies the correctness of the responses. To demonstrate the efficiency of this design, we prototyped TrustShadow on a real chip board with ARM TrustZone support, and evaluated its performance using both microbenchmarks and real-world applications. We showed TrustShadow introduces only negligible overhead to real-world applications.
@inproceedings{guan_trustshadow:_2017,
address = {New York, NY, USA},
series = {{MobiSys} '17},
title = {{TrustShadow}: {Secure} {Execution} of {Unmodified} {Applications} with {ARM} {TrustZone}},
isbn = {978-1-4503-4928-4},
shorttitle = {{TrustShadow}},
url = {http://doi.acm.org/10.1145/3081333.3081349},
doi = {10.1145/3081333.3081349},
abstract = {The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make them smarter. A variety of applications now run simultaneously on an ARM-based processor. For example, devices on the edge of the Internet are provided with higher horsepower to be entrusted with storing, processing and analyzing data collected from IoT devices. This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage. However, commodity OSes are prone to compromise. Once they are exploited, attackers can access the data on these devices. Since the data stored and processed on the devices can be sensitive, left untackled, this is particularly disconcerting. In this paper, we propose a new system, TrustShadow that shields legacy applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. In the secure world, TrustShadow constructs a trusted execution environment for security-critical applications. This trusted environment is maintained by a lightweight runtime system that coordinates the communication between applications and the ordinary OS running in the normal world. The runtime system does not provide system services itself. Rather, it forwards requests for system services to the ordinary OS, and verifies the correctness of the responses. To demonstrate the efficiency of this design, we prototyped TrustShadow on a real chip board with ARM TrustZone support, and evaluated its performance using both microbenchmarks and real-world applications. We showed TrustShadow introduces only negligible overhead to real-world applications.},
urldate = {2017-08-16TZ},
booktitle = {Proceedings of the 15th {Annual} {International} {Conference} on {Mobile} {Systems}, {Applications}, and {Services}},
publisher = {ACM},
author = {Guan, Le and Liu, Peng and Xing, Xinyu and Ge, Xinyang and Zhang, Shengzhi and Yu, Meng and Jaeger, Trent},
year = {2017},
pages = {488--501}
}
Downloads: 0
{"_id":"cAbmyGmEuhvw822aS","bibbaseid":"guan-liu-xing-ge-zhang-yu-jaeger-trustshadowsecureexecutionofunmodifiedapplicationswitharmtrustzone-2017","downloads":0,"creationDate":"2019-02-15T15:15:00.796Z","title":"TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone","author_short":["Guan, L.","Liu, P.","Xing, X.","Ge, X.","Zhang, S.","Yu, M.","Jaeger, T."],"year":2017,"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/ky25","bibdata":{"bibtype":"inproceedings","type":"inproceedings","address":"New York, NY, USA","series":"MobiSys '17","title":"TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone","isbn":"978-1-4503-4928-4","shorttitle":"TrustShadow","url":"http://doi.acm.org/10.1145/3081333.3081349","doi":"10.1145/3081333.3081349","abstract":"The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make them smarter. A variety of applications now run simultaneously on an ARM-based processor. For example, devices on the edge of the Internet are provided with higher horsepower to be entrusted with storing, processing and analyzing data collected from IoT devices. This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage. However, commodity OSes are prone to compromise. Once they are exploited, attackers can access the data on these devices. Since the data stored and processed on the devices can be sensitive, left untackled, this is particularly disconcerting. In this paper, we propose a new system, TrustShadow that shields legacy applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. In the secure world, TrustShadow constructs a trusted execution environment for security-critical applications. This trusted environment is maintained by a lightweight runtime system that coordinates the communication between applications and the ordinary OS running in the normal world. The runtime system does not provide system services itself. Rather, it forwards requests for system services to the ordinary OS, and verifies the correctness of the responses. To demonstrate the efficiency of this design, we prototyped TrustShadow on a real chip board with ARM TrustZone support, and evaluated its performance using both microbenchmarks and real-world applications. We showed TrustShadow introduces only negligible overhead to real-world applications.","urldate":"2017-08-16TZ","booktitle":"Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services","publisher":"ACM","author":[{"propositions":[],"lastnames":["Guan"],"firstnames":["Le"],"suffixes":[]},{"propositions":[],"lastnames":["Liu"],"firstnames":["Peng"],"suffixes":[]},{"propositions":[],"lastnames":["Xing"],"firstnames":["Xinyu"],"suffixes":[]},{"propositions":[],"lastnames":["Ge"],"firstnames":["Xinyang"],"suffixes":[]},{"propositions":[],"lastnames":["Zhang"],"firstnames":["Shengzhi"],"suffixes":[]},{"propositions":[],"lastnames":["Yu"],"firstnames":["Meng"],"suffixes":[]},{"propositions":[],"lastnames":["Jaeger"],"firstnames":["Trent"],"suffixes":[]}],"year":"2017","pages":"488–501","bibtex":"@inproceedings{guan_trustshadow:_2017,\n\taddress = {New York, NY, USA},\n\tseries = {{MobiSys} '17},\n\ttitle = {{TrustShadow}: {Secure} {Execution} of {Unmodified} {Applications} with {ARM} {TrustZone}},\n\tisbn = {978-1-4503-4928-4},\n\tshorttitle = {{TrustShadow}},\n\turl = {http://doi.acm.org/10.1145/3081333.3081349},\n\tdoi = {10.1145/3081333.3081349},\n\tabstract = {The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make them smarter. A variety of applications now run simultaneously on an ARM-based processor. For example, devices on the edge of the Internet are provided with higher horsepower to be entrusted with storing, processing and analyzing data collected from IoT devices. This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage. However, commodity OSes are prone to compromise. Once they are exploited, attackers can access the data on these devices. Since the data stored and processed on the devices can be sensitive, left untackled, this is particularly disconcerting. In this paper, we propose a new system, TrustShadow that shields legacy applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. In the secure world, TrustShadow constructs a trusted execution environment for security-critical applications. This trusted environment is maintained by a lightweight runtime system that coordinates the communication between applications and the ordinary OS running in the normal world. The runtime system does not provide system services itself. Rather, it forwards requests for system services to the ordinary OS, and verifies the correctness of the responses. To demonstrate the efficiency of this design, we prototyped TrustShadow on a real chip board with ARM TrustZone support, and evaluated its performance using both microbenchmarks and real-world applications. We showed TrustShadow introduces only negligible overhead to real-world applications.},\n\turldate = {2017-08-16TZ},\n\tbooktitle = {Proceedings of the 15th {Annual} {International} {Conference} on {Mobile} {Systems}, {Applications}, and {Services}},\n\tpublisher = {ACM},\n\tauthor = {Guan, Le and Liu, Peng and Xing, Xinyu and Ge, Xinyang and Zhang, Shengzhi and Yu, Meng and Jaeger, Trent},\n\tyear = {2017},\n\tpages = {488--501}\n}\n\n","author_short":["Guan, L.","Liu, P.","Xing, X.","Ge, X.","Zhang, S.","Yu, M.","Jaeger, T."],"key":"guan_trustshadow:_2017","id":"guan_trustshadow:_2017","bibbaseid":"guan-liu-xing-ge-zhang-yu-jaeger-trustshadowsecureexecutionofunmodifiedapplicationswitharmtrustzone-2017","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/3081333.3081349"},"downloads":0},"search_terms":["trustshadow","secure","execution","unmodified","applications","arm","trustzone","guan","liu","xing","ge","zhang","yu","jaeger"],"keywords":["hypervisor","iot","iotsec","os","security","trustzone"],"authorIDs":[],"dataSources":["XxiQtwZYfozhQmvGR"]}