This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Untapped Potential of Trusted Execution Environments on Mobile Devices
PrePrint
ISSN: 1540-7993
Kari Kostiainen, ETH Zurich, Zurich
Jan-Erik Ekberg, Nokia Research Center, Helsinki
N Asokan, University of Helsinki, Helsinki
Nearly every smartphone, and even the occasional feature phone, today contains a hardware-based trusted execution environment (TEE). Smartphones with TEEs first appeared almost a decade ago, but their use has been limited – application developers have not had the means to make use of TEEs to improve the security (and usability) of their applications. In this article, we discuss why TEEs are so widely deployed in mobile devices, and what kind of capabilities they support. We then describe Nokia Research Center’s On-board Credentials (ObC) system which opens up the device TEE to application developers and some example applications that make use of ObC. We conclude by briefly outlining recent developments in standardizing TEE functionality.
Citation:
Kari Kostiainen, Jan-Erik Ekberg, N Asokan, "The Untapped Potential of Trusted Execution Environments on Mobile Devices," IEEE Security & Privacy, 21 April 2014. IEEE computer Society Digital Library. IEEE Computer Society, <http://doi.ieeecomputersociety.org/10.1109/MSP.2014.38>
Usage of this product signifies your acceptance of the Terms of Use.