Award Abstract # 1718086
SaTC: CORE: Small: Expanding TrustZone: Enabling Mobile Apps to Transparently Leverage TrustZone for Attestation and Data Protection

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: SYRACUSE UNIVERSITY
Initial Amendment Date: July 18, 2017
Latest Amendment Date: July 18, 2017
Award Number: 1718086
Award Instrument: Standard Grant
Program Manager: Daniela Oliveira
doliveir@nsf.gov
 (703)292-0000
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: August 15, 2017
End Date: July 31, 2021 (Estimated)
Total Intended Award Amount: $497,296.00
Total Awarded Amount to Date: $497,296.00
Funds Obligated to Date: FY 2017 = $497,296.00
History of Investigator:
  • Wenliang Du (Principal Investigator)
    wedu@syr.edu
Recipient Sponsored Research Office: Syracuse University
900 S CROUSE AVE
SYRACUSE
NY  US  13244-4407
(315)443-2807
Sponsor Congressional District: 22
Primary Place of Performance: Syracuse University
Syracuse
NY  US  13244-1200
Primary Place of Performance
Congressional District:
22
Unique Entity Identifier (UEI): C4BXLBC11LC6
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001718DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 7434, 7923
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Mobile device security is critical to millions of users and mobile operating system vulnerabilities can lead to exposure of sensitive data (e.g., passwords, credit card numbers, medical data) or compromise of sensitive operations (e.g., banking transactions). This research project is working to answer the following question: If the device's operating system is compromised, is it still possible to protect user's sensitive data and operations? The researchers are using new hardware technology, "Trusted Execution Environments (TEEs)," to enable such protection.

Many new processors offer a TEE, which is isolated from the normal operating system (OS) environment. Code and data inside the TEE is protected even when the OS running in the normal environment is compromised. In the mobile computing environment, only apps provided by the mobile system vendors are typically able to make use of the TEE, as some of the app logic must be installed within the TEE. This research project is developing techniques to enable device-neutral integration of third party apps with mobile TEEs, focusing on (1) app interaction with the TEE user interface, and (2) TEE-assisted interaction between app and server. The research team is designing interaction logic to hide TEE-specific details within the mobile OS, enabling third party app developers to use the TEE capabilities transparently from the mobile OS interface. The team is also designing app-to-cloud-server attestation techniques, to allow a mobile app to prove that communication (e.g., email, HTTP requests, phone calls, or SMS messages) was initiated by the app on the mobile device and not spoofed by a compromised mobile OS. The researchers are building their own TEE-enabled Android smartphone to support the security features developed by the project.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Ahlawat, A and Du, W "TruzCall: Secure VoIP Calling on Android using ARM TrustZone" 2020 Sixth International Conference on Mobile And Secure Services , 2020 https://doi.org/10.1109/MobiSecServ48690.2020.9042945 Citation Details
Francis Akowuah, Amit Ahlawat "Protecting Sensitive Data in Android SQLite Databases Using TrustZone" 2018 International Conference on Security & Management , v.2018 , 2018 Citation Details
Ying, Kailiang and Ahlawat, Amit and Alsharifi, Bilal and Jiang, Yuexin and Thavai, Priyank and Du, Wenliang "TruZ-Droid: Integrating TrustZone with Mobile Operating System" The 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018) , 2018 Citation Details
Ying, Kailiang and Thavai, Priyank and Du, Wenliang "TruZ-View: Developing TrustZone User Interface for Mobile OS Using Delegation Integration Model" ACM Conference on Data and Application Security and Privacy , v.2019 , 2019 10.1145/3292006.3300035 Citation Details

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Mobile device security is critical to millions of users and mobile operating system vulnerabilities can lead to exposure of sensitive data (e.g., passwords, credit card numbers, medical data) or compromise of sensitive operations (e.g., banking transactions). This research project is working to answer the following question: If the device's operating system is compromised, is it still possible to protect user's sensitive data and operations? The researchers are using new hardware technology, "Trusted Execution Environments (TEEs)," to enable such protection.

The main objective of this project is to integrate the TEE functionality in ARM processors with mobile operating systems, so normal-world apps can leverage the TEE functionalities. The project addresses two important aspects of the integration: app's interaction with the user interface (UI) inside TEE, and TEE-assisted interaction between app and server. The proposed work focuses on changing the operating system, so that the way apps interact with UI and server remains the same as before, even though the underlying interaction is quite different due to the involvement of TEE.

Several ideas have been proposed and implemented in this project. They mainly focus on the same theme: splitting the implementation of a particular system, so a small part of it (those depending on the TrustZone-protected information) is conducted inside the TrustZone, while the other part (the majority part) is still conducted inside the rich OS. Such splitting minimizes the size of the code added to the TrustZone, while still being transparent to applications. Several systems have been split in such a way, including the SSL library, the UI-interaction system, the GPS system, bar-code scanning system, voice-over-IP system, etc. The success of these split systems demonstrates the effectiveness and feasibility of the splitting idea. The idea can be generalized to other types of systems.

Testing the work on TrustZone has been very challenging. To solve this problem, we have developed a TrustZone emulator, and used it to conduct testing. This success of this emulator inspired us to look at other similar challenging settings, thinking about whether they can be emulated. That has led to our Internet Emulator idea, which is to develop an emulator for the Internet, so we can conduct activities, especially education-related activities, which are difficult, or even illegal, to conduct on the real Internet. This outcome has a potential impact in cybersecurity and networking education.


Last Modified: 11/06/2021
Modified by: Wenliang Du

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page