Using ARM trustzone to build a trusted language runtime for mobile applications

  • Santos N
  • Raj H
  • Saroiu S
  • et al.
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

This paper presents the design, implementation, and evaluation of the Trusted Language Runtime (TLR), a system that protects the confidentiality and integrity of .NET mobile applications from OS security breaches. TLR enables separating an application's security-sensitive logic from the rest of the application, and isolates it from the OS and other apps. TLR provides runtime support for the secure component based on a .NET implementation for embedded devices. TLR reduces the TCB of an open source .NET implementation by a factor of $78$ with a tolerable performance cost. The main benefit of the TLR is to bring the developer benefits of managed code to trusted computing. With the TLR, developers can build their trusted components with the productivity benefits of modern high level languages, such as strong typing and garbage collection.

Cite

CITATION STYLE

APA

Santos, N., Raj, H., Saroiu, S., & Wolman, A. (2014). Using ARM trustzone to build a trusted language runtime for mobile applications. ACM SIGPLAN Notices, 49(4), 67–80. https://doi.org/10.1145/2644865.2541949

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free