Mobile Trusted Computing

Authors: N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, and Christian Wachsmann
Proceedings of the IEEE

Abstract

Trusted computing technologies for mobile devices have been researched, developed, and deployed over the past decade. Although their use has been limited so far, ongoing standardization may change this by opening up these technologies for easy access by developers and users. In this survey, we describe the current state of trusted computing solutions for mobile devices from research, standardization, and deployment perspectives.

Research Area: Trusted Computing

People

Dr. Kari Kostiainen
Senior Scientist

BibTex

@ARTICLE{asokan2014mobile,
	abbrev_source_title = {Proc. I.E.E.E.},
	doi = {10.1109/JPROC.2014.2332007},
	year = {2014-08},
	volume = {102},
	type = {Journal Article},
	journal = {Proceedings of the IEEE},
	author = {Asokan, N. and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian},
	abstract = {Trusted computing technologies for mobile devices have been researched, developed, and deployed over the past decade. Although their use has been limited so far, ongoing standardization may change this by opening up these technologies for easy access by developers and users. In this survey, we describe the current state of trusted computing solutions for mobile devices from research, standardization, and deployment perspectives.},
	issn = {1558-2256},
	keywords = {Attestation; low-cost trusted execution; mobile security; physically unclonable functions (PUFs); trusted computing},
	language = {en},
	address = {New York, NY},
	publisher = {IEEE},
	number = {8},
	title = {Mobile Trusted Computing},
	PAGES = {1189 - 1206},
	Note = {Manuscript received 2 September 2013, Revised 3 June 2014, Accepted 13 June 2014}
}

Research Collection: 20.500.11850/92164