Trusted Execution Environment and Linux- A Survey
Prabhav S, Madhav V Deshpande, Rakshak R Kamath, Rohan N, Latha NR "Trusted Execution Environment and Linux- A Survey". International Journal of Computer Trends and Technology (IJCTT) V45(1):28-32, March 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Improving security and user integrity in
Linux operating system has always been a
challenging task. One method of improving
security is by implementing the Trusted Execution
Environment (TEE). While Trusted Computing and
Linux may seem antithetical on the surface, Linux
users can benefit from the security features,
including system integrity and key confidentiality,
provided by Trusted Computing. Thisis a study on
the key concepts and software components that are
required to enable the use of the TEE. Also the
existing implementation of TEE by IBM, Intel and
TCG has been discussed here.
References
[1] “The MD5 Message-Digest Algorithm” R.Rivest ,
MIT Laboratory for Computer Science and RSA
Data Security, Inc. April 1992
[2] Trusted Computing and Linux, K Hall, T Lendacky,
E Ratliff, K Yoder- Linux Symposium,2005
[3] AIX V6 Advanced Security Features Introduction and
Configuration, 2007.
[4] OSLO: Improving the security of Trusted Computing,
Bernhard Kauer, 16th USENIX security symposium,
Pp.229- 237, 2007
[5] Verifying System Integrity, Sourabh Desai, George
Koikara, Pruthvi Natarajan and Ravi Shankar, 2009
[6] Intel Trusted Execution technology: White paper
2012
[7] Younan Y. 25 Years of Vulnerabilities: 1988-
2012[J], Sourcefire Crop, 2013.
[8] “A review of Comparative Study of SHA and MD5
algorithm”, International Journal of Computer
Applications (0975 – 8887) Volume 104 – No.14,
October 2014
[9] The Untapped Potential of Trusted Execution
Environments on Mobile Platforms. Jan-Erik Ekberg,
Kari Kostiainen, and N. Asokan, 2014
[10] “Review paper on Secure Hashing Algorithm and its
variants”,Priyanka Vadhera, Bhumika Lall,
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064,2014
[11] ”Overview of Linux Vulnerabilities”. International
Conference on Soft Computing in Information
Communication Technology (SCICT 2014)
[12] Trusted Execution Environment: What it is, what it is
not. 2015 IEEE Trustcom/BigDataSE/ISPA
[13] “A Comparative Analysis Of SHA and MD5
Algorithm”Piyush Gupta et al, / (IJCSIT)
International Journal of Computer Science and
Information Technologies, Vol. 5 (3) , 2014, 4492-
4495
Keywords
Linux, Trusted Execution,
Kernel, Security.