Questions tagged [tee]

Trusted Execution Environment is a completely isolated area on the main processor. Its job is to guarantee that code and data is stored, processed and protected in a secure environment.

16 questions
24
votes
2 answers

Difference between TPM, TEE and SE

What is the difference between a Secure Element (SE), a Trusted Execution Environment (TEE) and a Trusted Platform Module (TPM)? I understand that they all refer to an external secure cryptoprocessor, which is designed to store cryptographic keys…
Raoul722
  • 491
  • 1
  • 4
  • 10
8
votes
0 answers

What is the difference between TEE and HSM in Android Pie?

Android has the concept of hardware backed security as TEE and in latest Android i.e., Android Pie devices can have a HSM (Strongbox). What is the actual difference between TEE and HSM? Does Android HSM can be used as a cryptography solution such…
SAR
  • 181
  • 2
5
votes
2 answers

Loading code securely in the Trusted Execution Environment (ARM)

I am reading up on TEE in ARM. I am looking for pointers for the following questions: How does the TEE load code from the OS securely and guarantee that its not malicious code? I am guessing the code is signed and the TEE can verify the signature.…
user220201
  • 893
  • 9
  • 22
4
votes
0 answers

What is Silent Lake?

The Wikipédia's TEE entry mentions a hardware technology called Silent Lake that can support TEE implementations: The following embedded hardware technologies can be used to support TEE implementations: ... Intel: Trusted Execution…
Daniel
  • 627
  • 5
  • 16
3
votes
0 answers

Trusted Execution Environment Vs. Hypervisor or VMs: How are they related?

I am a newbie learning all about isolation and separation for securing applications and system software. In this regard, I was reading up on ARM TEE and how it is available on most Android phones to offer better security for important system…
tweet
  • 31
  • 2
3
votes
0 answers

Cambridge University paper on Android factory reset still up to date?

An answer (Data deleted after encryption - recoverable?) came to conclusions, which triggered some questions for me. Link to the paper: https://www.cl.cam.ac.uk/~rja14/Papers/fr_most15.pdf Cambridge University researchers tested a range of Android…
user205128
  • 41
  • 2
1
vote
0 answers

Access control for SMC call in TrustZone

What I found so far is that Application requests TA service using qseecom kernel driver. Monitor route that request and TA handles the request in Secure world and return the result.(generated private key). The application get the result(something…
user150497
  • 111
  • 1
1
vote
0 answers

Hardware roots of trust nowadays

I find that names and terms used in relation to Trusted (Trustworthy, Confidential,..) Computing are highly interchanged and thus creating confusion for laymen as am I. Trusted Computing has been around since the 90's and the idea is being tried to…
T. Maxx
  • 115
  • 1
  • 1
  • 5
1
vote
0 answers

Is there a way to verify what code has been run? Maybe TEE?

I would like to verify that users are running particular source code. Is there a way this could be achieved? I want to verify that the original "algorithm" has been followed correctly if you will. What I need is for the user to send "pure" (not…
Fred
  • 11
  • 1
1
vote
0 answers

How to find applications which use Replay Protected Memory Block (RPMB) partition of the underlying storage device in Android Trusty?

I am trying to find a list of applications which use RPMB partition in the underlying Storage Device (eMMC/UFS/NVMe) in Android Trusty environment. How do I go about doing this ? Thanks
1
vote
0 answers

Is it possible decrypt Android 8 encryption, if the device encryption key is gone (but with a known PIN and KEK)?

main question is in the title. Some clarification though: When you factory reset your encrypted phone, the old device encryption key (DEK a) gets deleted and a new encryption key (DEK b) is being generated, which is used to encrypt the device. The…
user205128
  • 41
  • 2
1
vote
0 answers

Is there a compiled list of TEE (Trusted Execution Environment) manufacturer/CA certificates?

I may be misunderstanding TEEs (I just learned about them from an HN post), but I have question regarding the features that seem to allow what seems to be the perfect form of DRM (to my maybe limited understanding of current DRM…
JoL
  • 242
  • 2
  • 7
1
vote
1 answer

Trusted execution environment vs dual microcontroller

In the context of cryptocurrency hardware wallets, what are pro and cons of a single TEE controller (Trusted execution environment) approach versus a dual microcontroller approach (one microcontroller is secure), as seen for instance on Ledger Nano?…
Rexcirus
  • 111
  • 4
0
votes
0 answers

What is the difference betwen a Trusted Computing Base and a Root of Trust?

What is the difference betwen a Trusted Computing Base (TCB) and a Root of Trust (RoT)? Can both terms be used interchangeably? A TCB is defined by the NIST as follows: Totality of protection mechanisms within a computer system, including hardware,…
DurandA
  • 107
  • 1
  • 10
0
votes
0 answers

Anti-Theft Mobile CPU

The newest Android phones use the Qualcomm Snapdragon 855 chipset with its TrustZone/TEE. The Android OS makes sure that a stolen phone, in its assembled form, is not usable. Does Trustzone further prevent the CPU from being removed from a stolen…
bobuhito
  • 230
  • 1
  • 8
1
2