Главная
Study mode:
on
1
Intro
2
Agenda Problem Statement
3
Technical Details / Characteristics
4
How it works (Example: authenticated write access)
5
VT-TEE/Trusty in Android (Two-VM)
6
Android Secure Storage (SS)
7
SS/TP : Tamper-Proof Secure storage
8
SS/TD: Tamper-Detection Secure storage
9
ACR Hypervisor Architecture
10
Secure Storage Virtualization - Confidentiality
11
ACRN Hypervisor SEED/SSEK Derivation
12
Conclusion
13
Future Considerations
Description:
Learn how to implement Android tamper-resistant secure storage and secure it in virtualization environments. Explore the full software stack of storage services based on RPMB in eMMC flash devices, including key generation, hardware root binding, and factory key provisioning. Discover secure storage virtualization architecture in ACRN hypervisor, focusing on creating root sub-keys for guest data encryption, building a "one-vm, two-world" TEE protection system, and isolating memory between guest TEE worlds and the hypervisor. Gain insights into authenticated write access, VT-TEE/Trusty in Android, and various secure storage types. Delve into ACRN hypervisor architecture, confidentiality measures, and SEED/SSEK derivation techniques for enhanced security in virtualized environments.

Implementing Android Tamper-Resistant Secure Storage in Virtualization

Linux Foundation
Add to list
0:00 / 0:00