TZEAMM: An Efficient and Secure Active Measurement Method Based on TrustZone

نویسندگان

چکیده

With the rapid development of computer and communication technology, embedded systems are widely used in smart devices. The increasing connectivity these difficulties providing comprehensive security have made such devices vulnerable to malicious attacks. Passive defense technologies traffic-based intrusion detection not fully effective against Trusted execution environment (TEE) technology can ensure system unknown attacks some extent. Most researchers use TrustZone implement TEE. However, problem is that API interface TEE module which provides service secure. Therefore, actively defend attacks, we developed a trusted computing active measurement architecture based on TrustZone. To overcome serious modules need be passively invoked provide services, proposed an closed-loop immune mechanism. reduce base performance overhead, removed certain functional from environment. In addition, this architecture, trust chain dynamic method target applications. We changed traditional attack response method, requires entire restarted after attack, by developing fallback mechanism more suitable for system. Finally, verified effectiveness model. Performance testing analysis showed reduced impact mechanisms future, will extend our research fine-grained measurements.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

An Efficient SPRP-secure Construction based on Pseudo Random Involution

Here we present a new security notion called as pseudo random involution or PRI which are associated with tweakable involution enciphering schemes or TIES (i.e., the encryption and decryption are same algorithm). This new security notion is important in two reasons. Firstly, it is the natural security notion for TIES which are having practical importance. Secondly, we show that there is a gener...

متن کامل

An efficient semantically secure elliptic curve cryptosystem based on KMOV

We propose an elliptic curve scheme over the ring Zn2 , which is efficient and semantically secure in the standard model. There appears to be no previous elliptic curve cryptosystem based on factoring that enjoys both of these properties. The KMOV scheme has been used as an underlying primitive to obtain efficiency and probabilistic encryption. Semantic security of the scheme is based on a new ...

متن کامل

An Efficient Secure Channel Coding Scheme based on Polar Codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2023

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2023/6921960