Secure key management in a trusted domain on mobile devices
Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
As mobile devices manage more and more sensitive information they have become a more targeted platform to exploit. To maintain system integrity while providing a highly responsive product, platform developers have developed hardware as well as software solutions to improve security. Until recently however, it was only possible to devise hardware solutions to achieve the security requirements of EU’s Restricted VoIP protocol. This thesis investigates whether a software solution can provide the necessary levels of assurance to protect EU Restricted Voice over Internet Protocol (VoIP) communications.
The thesis covers a literature study over possible approaches to protect sensitive information, which was used in the risk analysis to derive five tests to evaluate the trusted execution environment.
The tests show that the trusted execution environment does provide good protection but that the implementation and design greatly influence the robustness and level of assurance that can be expected from the trusted execution environment.
Place, publisher, year, edition, pages
2015. , 75 p.
TPM, TEE, Common Criteria, Evaluation
Other Engineering and Technologies Other Engineering and Technologies not elsewhere specified
IdentifiersURN: urn:nbn:se:liu:diva-118501ISRN: LIU-IDA/LITH-EX-A–15/015–SEOAI: oai:DiVA.org:liu-118501DiVA: diva2:815011
Sectra Communications AB
Subject / course
2015-05-05, Muhammad al-Khwarizmi, SE-581 83 LINKÖPING, Linköping, 13:15 (English)
Leifler, Ola, PhDAbrahamsson, Thomas
Shahmehri, Nahid, Professor