DocumentCode :
1001751
Title :
Protecting Critical Data
Author :
Mihm, Tom
Author_Institution :
Motorola
Volume :
24
Issue :
6
fYear :
2007
Firstpage :
592
Lastpage :
592
Abstract :
TrustZone technology provides a defense against malicious software attempting to tamper with critical data such as digital-rights management (DRM) counters. The basic premise of our solution is that the state of the flash can serve as a point of reference to detect when rollback has occurred. Our solution is embodied in a trusted software application that needs the protection provided by the TrustZone Secure World. This application represents the flash´s state by generating a hash over a 32-byte sample of contiguous flash content, starting at a randomly selected address. The reference hash of the critical data is retrieved by decrypting the stored items just described and reversing the process. Next, the critical data itself is decrypted, and a new hash is generated from it. The new hash is compared with the reference hash to determine the critical data´s integrity.
Keywords :
cryptography; data integrity; flash memories; synchronisation; TrustZone technology; cryptography; data integrity; decryption; flash memory; hash function; malicious software; Application software; Counting circuits; Cryptography; Data security; Embedded computing; Flash memory; Information retrieval; Protection; Technology management; Testing; DRM counters; TrustZone technology; rollback attack; secure execution environment; trusted software application;
fLanguage :
English
Journal_Title :
Design & Test of Computers, IEEE
Publisher :
ieee
ISSN :
0740-7475
Type :
jour
DOI :
10.1109/MDT.2007.201
Filename :
4397185
Link To Document :
بازگشت