信息网络安全 ›› 2018, Vol. 18 ›› Issue (2): 84-91.doi: 10.3969/j.issn.1671-1122.2018.02.012

• • 上一篇    下一篇

移动终端TEE技术进展研究

刘志娟1,2(), 高隽2, 丁启枫3, 王跃武1   

  1. 1.中国科学院数据与通信保护研究教育中心,北京 100093
    2.工业和信息化部产业发展促进中心,北京 100846
    3.国家无线电监测中心检测中心,北京 100041
  • 收稿日期:2017-11-15 出版日期:2018-02-10 发布日期:2020-05-11
  • 作者简介:作者简介:刘志娟(1991—),女,河北,工程师,硕士,主要研究方向为终端系统安全、网络安全;高隽(1979—),女,北京,经济师,主要研究方向为网络安全、经济管理;丁启枫(1990—),男,安徽,工程师,硕士,主要研究方向为系统安全、无线通信;王跃武(1975—),男,河南,副研究员,博士,主要研究方向为网络与系统安全。
  • 基金资助:
    “十三五”国家密码发展基金密码理论研究课题[MMJJ20170215];工业和信息化部产业发展促进中心2016 年专题研究课题

Research on Development of Trusted Execution Environment Technology on Mobile Platform

Zhijuan LIU1,2(), Jun GAO2, Qifeng DING3, Yuewu WANG1   

  1. 1. The Data Assurance and Communication Security Research Center of Chinese Academy of Sciences, Beijing 100093, China
    2. Industry Development and Promotion Center of Ministry of Industry and Information Technology of the People’s Republic of China, Beijing 100846, China;
    3. The State Radio Monitoring Center Testing Center, Beijing 100041, China
  • Received:2017-11-15 Online:2018-02-10 Published:2020-05-11

摘要:

移动终端TEE技术是目前移动应用安全保障的核心技术,受到产业和学术领域的广泛关注。文章全面分析TEE技术的安全特性对于相关研究开展具有重要参考价值。首先从TEE安全环境构建及安全功能可信提供两个角度,系统完整地总结了TEE技术的安全特征。然后,围绕TEE安全特征的实现,文章对相关软硬件技术发展进行了分析,提出了基本的移动终端TEE软硬件技术架构。在全面分析TEE技术的基础上,文章还将TEE技术与其他当前移动终端关注的系统安全技术进行了对比分析,为TEE技术的具体应用提供了借鉴。最后,文章还针对TEE技术发展总结了其面临的技术挑战,为TEE技术的下一步发展提供了参考。

关键词: 移动终端, 可信执行环境, 安全隔离, 可信用户交互, 安全证明

Abstract:

Trusted execution environment(TEE)as one of the most prevalent mobile device secure technology has attracted more and more attention from academy field and industry field. Thus, analyzing the security of TEE technology thoroughly is very valuable. According to TEE construction and TEE secure function providing, this paper presents five secure features of TEE in detail. Then, the software and hardware technologies used to implement the five secure features are investigated and the general software and hardware architecture are presented. In addition, we compare TEE technology with other mobile device secure technology carefully. Finally, the challenges faced by TEE technology development are listed. The work of this paper may be a good reference for TEE technology development.

Key words: mobile device, trusted execution environment, isolation, trustworthy user interface, security attestation

中图分类号: