Trusted Execution Environment and Linux- A Survey
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2017 by IJCTT Journal|
|Year of Publication : 2017|
|Authors : Prabhav S, Madhav V Deshpande, Rakshak R Kamath, Rohan N, Latha NR|
|DOI : 10.14445/22312803/IJCTT-V45P105|
Prabhav S, Madhav V Deshpande, Rakshak R Kamath, Rohan N, Latha NR "Trusted Execution Environment and Linux- A Survey". International Journal of Computer Trends and Technology (IJCTT) V45(1):28-32, March 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Improving security and user integrity in Linux operating system has always been a challenging task. One method of improving security is by implementing the Trusted Execution Environment (TEE). While Trusted Computing and Linux may seem antithetical on the surface, Linux users can benefit from the security features, including system integrity and key confidentiality, provided by Trusted Computing. Thisis a study on the key concepts and software components that are required to enable the use of the TEE. Also the existing implementation of TEE by IBM, Intel and TCG has been discussed here.
 “The MD5 Message-Digest Algorithm” R.Rivest , MIT Laboratory for Computer Science and RSA Data Security, Inc. April 1992
 Trusted Computing and Linux, K Hall, T Lendacky, E Ratliff, K Yoder- Linux Symposium,2005
 AIX V6 Advanced Security Features Introduction and Configuration, 2007.
 OSLO: Improving the security of Trusted Computing, Bernhard Kauer, 16th USENIX security symposium, Pp.229- 237, 2007
 Verifying System Integrity, Sourabh Desai, George Koikara, Pruthvi Natarajan and Ravi Shankar, 2009
 Intel Trusted Execution technology: White paper 2012
 Younan Y. 25 Years of Vulnerabilities: 1988- 2012[J], Sourcefire Crop, 2013.
 “A review of Comparative Study of SHA and MD5 algorithm”, International Journal of Computer Applications (0975 – 8887) Volume 104 – No.14, October 2014
 The Untapped Potential of Trusted Execution Environments on Mobile Platforms. Jan-Erik Ekberg, Kari Kostiainen, and N. Asokan, 2014
 “Review paper on Secure Hashing Algorithm and its variants”,Priyanka Vadhera, Bhumika Lall, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064,2014
 ”Overview of Linux Vulnerabilities”. International Conference on Soft Computing in Information Communication Technology (SCICT 2014)
 Trusted Execution Environment: What it is, what it is not. 2015 IEEE Trustcom/BigDataSE/ISPA
 “A Comparative Analysis Of SHA and MD5 Algorithm”Piyush Gupta et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 4492- 4495
Linux, Trusted Execution, Kernel, Security.