Home > Research > Publications & Outputs > Flash controller-based secure execution environ...

Links

Text available via DOI:

View graph of relations

Flash controller-based secure execution environment for protecting code confidentiality

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Flash controller-based secure execution environment for protecting code confidentiality. / Zhang, Zheng; Xue, Jingfeng; Chen, Tian et al.
In: Journal of Systems Architecture, Vol. 152, 103172, 31.07.2024.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Zhang, Z, Xue, J, Chen, T, Zhao, Y & Meng, W 2024, 'Flash controller-based secure execution environment for protecting code confidentiality', Journal of Systems Architecture, vol. 152, 103172. https://doi.org/10.1016/j.sysarc.2024.103172

APA

Zhang, Z., Xue, J., Chen, T., Zhao, Y., & Meng, W. (2024). Flash controller-based secure execution environment for protecting code confidentiality. Journal of Systems Architecture, 152, Article 103172. https://doi.org/10.1016/j.sysarc.2024.103172

Vancouver

Zhang Z, Xue J, Chen T, Zhao Y, Meng W. Flash controller-based secure execution environment for protecting code confidentiality. Journal of Systems Architecture. 2024 Jul 31;152:103172. Epub 2024 May 9. doi: 10.1016/j.sysarc.2024.103172

Author

Zhang, Zheng ; Xue, Jingfeng ; Chen, Tian et al. / Flash controller-based secure execution environment for protecting code confidentiality. In: Journal of Systems Architecture. 2024 ; Vol. 152.

Bibtex

@article{1bba4405e69c49b195b82bcd395278e0,
title = "Flash controller-based secure execution environment for protecting code confidentiality",
abstract = "With the rapid evolution of Internet-of-Things (IoT), billions of IoT devices have connected to the Internet, collecting information via tags and sensors. For an IoT device, the application code itself and data collected by sensors can be of great commercial value. It is challenging to protect them because IoT devices are prone to compromise due to the inevitable vulnerabilities of commodity Operating Systems. Trusted Execution Environment (TEE) is one of the solutions that protects sensitive data by running security-sensitive workloads in a secure world. However, this solution does not work for most of the IoT devices that are limited in resources.In this paper, we propose Flash Controller-based Secure Execution Environment (FCSEE), an approach to protect security-sensitive code and data for IoT devices using the flash controller. Our approach constructs a secure execution environment on the target flash memory by modifying the execution logic of its controller, leveraging it as a co-processor to execute security-sensitive workloads of the host device. By extending the original functionality of the flash firmware, FCSEE also provides several much-needed security primitives to protect sensitive data. We constructed a prototype based on a Trans-Flash (TF) card and implemented a proof of its confidentiality. Our evaluation results indicate that FCSEE can confidentially execute security-sensitive workloads from the host and efficiently protect its sensitive data.",
author = "Zheng Zhang and Jingfeng Xue and Tian Chen and Yuhang Zhao and Weizhi Meng",
year = "2024",
month = jul,
day = "31",
doi = "10.1016/j.sysarc.2024.103172",
language = "English",
volume = "152",
journal = "Journal of Systems Architecture",
issn = "1383-7621",
publisher = "Elsevier Science B.V.",

}

RIS

TY - JOUR

T1 - Flash controller-based secure execution environment for protecting code confidentiality

AU - Zhang, Zheng

AU - Xue, Jingfeng

AU - Chen, Tian

AU - Zhao, Yuhang

AU - Meng, Weizhi

PY - 2024/7/31

Y1 - 2024/7/31

N2 - With the rapid evolution of Internet-of-Things (IoT), billions of IoT devices have connected to the Internet, collecting information via tags and sensors. For an IoT device, the application code itself and data collected by sensors can be of great commercial value. It is challenging to protect them because IoT devices are prone to compromise due to the inevitable vulnerabilities of commodity Operating Systems. Trusted Execution Environment (TEE) is one of the solutions that protects sensitive data by running security-sensitive workloads in a secure world. However, this solution does not work for most of the IoT devices that are limited in resources.In this paper, we propose Flash Controller-based Secure Execution Environment (FCSEE), an approach to protect security-sensitive code and data for IoT devices using the flash controller. Our approach constructs a secure execution environment on the target flash memory by modifying the execution logic of its controller, leveraging it as a co-processor to execute security-sensitive workloads of the host device. By extending the original functionality of the flash firmware, FCSEE also provides several much-needed security primitives to protect sensitive data. We constructed a prototype based on a Trans-Flash (TF) card and implemented a proof of its confidentiality. Our evaluation results indicate that FCSEE can confidentially execute security-sensitive workloads from the host and efficiently protect its sensitive data.

AB - With the rapid evolution of Internet-of-Things (IoT), billions of IoT devices have connected to the Internet, collecting information via tags and sensors. For an IoT device, the application code itself and data collected by sensors can be of great commercial value. It is challenging to protect them because IoT devices are prone to compromise due to the inevitable vulnerabilities of commodity Operating Systems. Trusted Execution Environment (TEE) is one of the solutions that protects sensitive data by running security-sensitive workloads in a secure world. However, this solution does not work for most of the IoT devices that are limited in resources.In this paper, we propose Flash Controller-based Secure Execution Environment (FCSEE), an approach to protect security-sensitive code and data for IoT devices using the flash controller. Our approach constructs a secure execution environment on the target flash memory by modifying the execution logic of its controller, leveraging it as a co-processor to execute security-sensitive workloads of the host device. By extending the original functionality of the flash firmware, FCSEE also provides several much-needed security primitives to protect sensitive data. We constructed a prototype based on a Trans-Flash (TF) card and implemented a proof of its confidentiality. Our evaluation results indicate that FCSEE can confidentially execute security-sensitive workloads from the host and efficiently protect its sensitive data.

U2 - 10.1016/j.sysarc.2024.103172

DO - 10.1016/j.sysarc.2024.103172

M3 - Journal article

VL - 152

JO - Journal of Systems Architecture

JF - Journal of Systems Architecture

SN - 1383-7621

M1 - 103172

ER -