Build a trusted storage system on a mobile phone

被引:1
作者
Zhang, Qiang [1 ]
Qiao, JianZhong [1 ]
Meng, QingYang [2 ]
机构
[1] Northeastern Univ, Sch Engn & Comp Sci, Shenyang, Liaoning, Peoples R China
[2] Co Qianchuan, Room 909,155-5 Innovat Rd, Shenyang, Liaoning, Peoples R China
关键词
mobile computing; security of data; storage allocation; formal verification; mobile handsets; mobile phone; Trusted Execution Environment-based trusted storage system; TEE; TSS; mobile devices; GlobalPlatform specifications; security storage operation properties; atomicity operations; REE's kernel memory space; memory overloads; formal method; functional correctness; traditional formal verification tool; data integrity; memory times allocation;
D O I
10.1049/iet-ifs.2018.5031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authors introduce their design, implementation and formally verification of a Trusted Execution Environment (TEE)-based trusted storage system (TSS) in mobile devices, which conforms to GlobalPlatform specifications. The authors' TSS provides not only authenticating the integrity and freshness of data but also many security storage operation properties like atomicity operations of a persistent object. To improve data store efficient when a big persistent object is read or written, a new mechanism that dynamic allocate continuous memory in REE's kernel memory space and map the address to the TEE through a communication pipe is proposed. This method can reduce switching times, allocating memory times and copy memory overloads between two worlds. A formal method is used in their design and development to guarantee the correctness and security of TSS. They consider the functional correctness mainly in this study, and use traditional formal verification tool - VCC verify the functional correctness of TSS. Their evaluation demonstrates its advantage compared to existing systems in addition.
引用
收藏
页码:157 / 166
页数:10
相关论文
共 37 条
[1]   COGENT: Verifying High-Assurance File System Implementations [J].
Amani, Sidney ;
Hixon, Alex ;
Chen, Zilin ;
Rizkallah, Christine ;
Chubb, Peter ;
O'Connor, Liam ;
Beeren, Joel ;
Nagashima, Yutaka ;
Lim, Japheth ;
Sewell, Thomas ;
Tuong, Joseph ;
Keller, Gabriele ;
Murray, Toby ;
Klein, Gerwin ;
Heiser, Gernot .
ACM SIGPLAN NOTICES, 2016, 51 (04) :175-188
[2]  
[Anonymous], 2014, CVE20144322
[3]  
[Anonymous], 2008, Proceedings of the 3rd ACM workshop on Scalable trusted computing, DOI DOI 10.1145/1456455.1456460
[4]  
[Anonymous], 2015, CVE20154421
[5]  
[Anonymous], 2015, CVE20154422
[6]  
BARNETT M, 2005, LNCS, V4111, P364, DOI DOI 10.1007/11804192_17
[7]  
Baumann C., 2009, DOCT S SYST SOFTW VE, P20
[8]  
Brakensiek J., 2008, Proceedings of the 1st workshop on Isolation and integration in embedded systems, IIES '08, P17, DOI 10.1145/1435458
[9]   Architectural Support for DevOps in a Neo-Metropolis BDaaS Platform [J].
Chen, Hong-Mei ;
Kazman, Rick ;
Haziyev, Serge ;
Kropov, Valentyn ;
Chtchourov, Dmitri .
2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW), 2015, :25-30
[10]   Formal methods: State of the art and future directions [J].
Clarke, EM ;
Wing, JM .
ACM COMPUTING SURVEYS, 1996, 28 (04) :626-643