Reference Hub1
Arm Hypervisor and Trustzone Alternatives

Arm Hypervisor and Trustzone Alternatives

Nezer Jacob Zaidenberg, Raz Ben Yehuda, Roee Shimon Leon
Copyright: © 2020 |Pages: 13
ISBN13: 9781522597155|ISBN10: 1522597158|EISBN13: 9781522597162
DOI: 10.4018/978-1-5225-9715-5.ch079
Cite Chapter Cite Chapter

MLA

Zaidenberg, Nezer Jacob, et al. "Arm Hypervisor and Trustzone Alternatives." Encyclopedia of Criminal Activities and the Deep Web, edited by Mehdi Khosrow-Pour D.B.A., IGI Global, 2020, pp. 1150-1162. https://doi.org/10.4018/978-1-5225-9715-5.ch079

APA

Zaidenberg, N. J., Ben Yehuda, R., & Leon, R. S. (2020). Arm Hypervisor and Trustzone Alternatives. In M. Khosrow-Pour D.B.A. (Ed.), Encyclopedia of Criminal Activities and the Deep Web (pp. 1150-1162). IGI Global. https://doi.org/10.4018/978-1-5225-9715-5.ch079

Chicago

Zaidenberg, Nezer Jacob, Raz Ben Yehuda, and Roee Shimon Leon. "Arm Hypervisor and Trustzone Alternatives." In Encyclopedia of Criminal Activities and the Deep Web, edited by Mehdi Khosrow-Pour D.B.A., 1150-1162. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9715-5.ch079

Export Reference

Mendeley
Favorite

Abstract

Many scenarios such as DRM, payments, and homeland security require a trusted and verified trusted execution environment (TEE) on ARM. In most cases such TEE should be available in source code mode. The vendor cannot conduct code review and ensure that the operating system is trustworthy unless source code is available. Android and other rich execution environments (REEs) support various TEE implementations. Each TEE implementation has its own unique way of deploying trusted applications and features. Most TEEs in ARM can be started at TrustZone™ or Hyp (Hypervisor) mode. Choosing a proper TEE operating system can be a problem for trusted application developers and hardware vendors. This article discuss the hypervisor vs. TrustZone™ implementation dilemma. Furthermore, the article surveys multiple ARM TrustZone™ TEE solutions and ARM virtualization solutions that are available today with source code. This article allows IoT vendors and SoC manufacturer to select a suitable TEE for their platform needs based on their criteria.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.