While trusted execution environments (TEEs) provide industry standard security and isolation, TEE requests through secure monitor calls (SMCs) attribute to large time overhead and weakened temporal predictability. Moreover, as current available TEE solutions are designed for Linux and/or Android initially, it will encounter many constraints (e.g., driver libraries incompatible, large memory footprint, etc.) when integrating with low-end Real-Time Operating Systems, RTOSs. In this paper, we present MiniTEE to understand, evaluate and discuss the benefits and limitations when integrating TrustZone-assisted TEEs with RTOSs. We demonstrate how MiniTEE can be adequately exploited for meeting the real-time needs, while presenting a low performance overhead to the rich OSs (i.e., low-end RTOSs).
[1]
Eli Tilevich,et al.
RT-Trust: Automated refactoring for different trusted execution environments under real-time constraints
,
2020,
J. Comput. Lang..
[2]
Min Chen,et al.
SA-EAST
,
2017,
ACM Trans. Embed. Comput. Syst..
[3]
N. Asokan,et al.
Open-TEE -- An Open Virtual Trusted Execution Environment
,
2015,
2015 IEEE Trustcom/BigDataSE/ISPA.
[4]
Riham Altawy,et al.
Security, Privacy, and Safety Aspects of Civilian Drones
,
2016,
ACM Trans. Cyber Phys. Syst..
[5]
Sandro Pinto,et al.
Demystifying Arm TrustZone
,
2019,
ACM Comput. Surv..