Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure hypervisor versus trusted execution environment: Security analysis for mobile fingerprint identification applications
Linköping University, Department of Computer and Information Science, Database and information techniques.
Linköping University, Department of Computer and Information Science, Database and information techniques.
2017 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Fingerprint identification is becoming increasingly popular as a means of authentication for handheld devices of different kinds. In order to secure such an authentication solution it is common to use a TEE implementation. This thesis examines the possibility of replacing a TEE with a hypervisor-based solution instead, with the intention of keeping the same security features that a TEE can offer. To carry out the evaluation a suitable method is constructed. This method makes use of fault trees to be able to find possible vulnerabilities in both systems, and these vulnerabilities are then documented. The vulnerabilities of both systems are also compared to each other to identify differences in how they are handled. It is concluded that if the target platform has the ability to implement a TEE solution, it can also implement the same solution using a hypervisor. However, the authors recommend against porting a working TEE solution, as TEEs often offer finished APIs for common operations that would require re-implementation in the examined hypervisor.

Place, publisher, year, edition, pages
2017. , 76 p.
Keyword [en]
tee, information security, hypervisor, attack trees, fault trees
National Category
Information Systems
Identifiers
URN: urn:nbn:se:liu:diva-139227ISRN: LIU-IDA/LITH-EX-A--17/011--SEOAI: oai:DiVA.org:liu-139227DiVA: diva2:1120483
Subject / course
Computer science
Presentation
2017-05-17, Muhammad al-Khwarizmi, Linköpings Universitet, B-huset, Linköping, 13:00 (English)
Supervisors
Examiners
Available from: 2017-07-06 Created: 2017-07-06 Last updated: 2017-07-06Bibliographically approved

Open Access in DiVA

fulltext(3996 kB)8 downloads
File information
File name FULLTEXT01.pdfFile size 3996 kBChecksum SHA-512
c58c3cf8b71e6f2fe228714d0418b9aee2595ddef5d5b28243a48e27ef6e6c10e90e675fd709ba4941fe838318ce2279488c9e4d38ea393da423c542632cf375
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Sundblad, AntonBrunberg, Gustaf
By organisation
Database and information techniques
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 8 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 77 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf