Arm Hypervisor and Trustzone Alternatives

Author(s):  
Nezer Jacob Zaidenberg ◽  
Raz Ben Yehuda ◽  
Roee Shimon Leon

Many scenarios such as DRM, payments, and homeland security require a trusted and verified trusted execution environment (TEE) on ARM. In most cases such TEE should be available in source code mode. The vendor cannot conduct code review and ensure that the operating system is trustworthy unless source code is available. Android and other rich execution environments (REEs) support various TEE implementations. Each TEE implementation has its own unique way of deploying trusted applications and features. Most TEEs in ARM can be started at TrustZone™ or Hyp (Hypervisor) mode. Choosing a proper TEE operating system can be a problem for trusted application developers and hardware vendors. This article discuss the hypervisor vs. TrustZone™ implementation dilemma. Furthermore, the article surveys multiple ARM TrustZone™ TEE solutions and ARM virtualization solutions that are available today with source code. This article allows IoT vendors and SoC manufacturer to select a suitable TEE for their platform needs based on their criteria.

2020 ◽  
Vol 71 (3) ◽  
pp. 268-271
Author(s):  
N. Uzakbayev ◽  
◽  
М. Yerekesheva ◽  

Android is a relatively new operating system that has become very popular in the mobile device market in a short time. Operating system developers must adhere to the following basic requirements: the new platform must be based on open standards, which will reduce development costs and provide mobile application developers with access to all system functions to create applications. One of the main advantages of the Android platform is its transparency. The Android operating system is open source and free. This allows users to access the source code and understand how application properties and functions are implemented. This article describes the software, structure, functionality, and scope of the client-server application for personnel selection created on the Android platform.


2017 ◽  
Vol 21 (1) ◽  
pp. 40-47 ◽  
Author(s):  
Sandro Pinto ◽  
Tiago Gomes ◽  
Jorge Pereira ◽  
Jorge Cabral ◽  
Adriano Tavares

2022 ◽  
Vol 31 (2) ◽  
pp. 1-23
Author(s):  
Jevgenija Pantiuchina ◽  
Bin Lin ◽  
Fiorella Zampetti ◽  
Massimiliano Di Penta ◽  
Michele Lanza ◽  
...  

Refactoring operations are behavior-preserving changes aimed at improving source code quality. While refactoring is largely considered a good practice, refactoring proposals in pull requests are often rejected after the code review. Understanding the reasons behind the rejection of refactoring contributions can shed light on how such contributions can be improved, essentially benefiting software quality. This article reports a study in which we manually coded rejection reasons inferred from 330 refactoring-related pull requests from 207 open-source Java projects. We surveyed 267 developers to assess their perceived prevalence of these identified rejection reasons, further complementing the reasons. Our study resulted in a comprehensive taxonomy consisting of 26 refactoring-related rejection reasons and 21 process-related rejection reasons. The taxonomy, accompanied with representative examples and highlighted implications, provides developers with valuable insights on how to ponder and polish their refactoring contributions, and indicates a number of directions researchers can pursue toward better refactoring recommenders.


2021 ◽  
Vol 2 (3) ◽  
pp. 382-389
Author(s):  
Rian Yussandi

Android is a mobile device on the operating system for mobile phones based on Linux, android provides an open platform for developers to create applications. Android-based application developers make applications so that they can be useful for the community ranging from game genre applications, education, entertainment and simulation applications that are very likely to be created and run on this android operating system. Simulation is the process of designing a matemastis or logical model of a real system, conducting experiments on models using computers to describe, explain and predict system behavior. For a simulation application company can be used as a medium of product promotion, while for smartphone users can help to channel the existing imagination into a real picture. The application of simulation applications many functions, one example of its application to two-wheeled motor vehicles. By utilizing android application and the growth of vehicle users that lead to the hobby of modification, it can be utilized by creating an android-based coloring simulation application to help modifiers and modification lovers in order to channel their imagination and make it easier to design colors as desired. Without having to bother using design software that requires special skills


2022 ◽  
Vol 15 (1) ◽  
pp. 1-26
Author(s):  
Mathieu Gross ◽  
Konrad Hohentanner ◽  
Stefan Wiehler ◽  
Georg Sigl

Isolated execution is a concept commonly used for increasing the security of a computer system. In the embedded world, ARM TrustZone technology enables this goal and is currently used on mobile devices for applications such as secure payment or biometric authentication. In this work, we investigate the security benefits achievable through the usage of ARM TrustZone on FPGA-SoCs. We first adapt Microsoft’s implementation of a firmware Trusted Platform Module (fTPM) running inside ARM TrustZone for the Zynq UltraScale+ platform. This adaptation consists in integrating hardware accelerators available on the device to fTPM’s implementation and to enhance fTPM with an entropy source derived from on-chip SRAM start-up patterns. With our approach, we transform a software implementation of a TPM into a hybrid hardware/software design that could address some of the security drawbacks of the original implementation while keeping its flexibility. To demonstrate the security gains obtained via the usage of ARM TrustZone and our hybrid-TPM on FPGA-SoCs, we propose a framework that combines them for enabling a secure remote bitstream loading. The approach consists in preventing the insecure usages of a bitstream reconfiguration interface that are made possible by the manufacturer and to integrate the interface inside a Trusted Execution Environment.


Sign in / Sign up

Export Citation Format

Share Document