Skip to Main content Skip to Navigation
New interface
Conference papers

Practical and Privacy-Preserving TEE Migration

Abstract : Running within the TEE, the Trusted Applications (TA) belong to diverse service providers. Each TA manipulates a profile, constituted of secret credentials and user’s private data. Normally, a user should be able to transfer his TEE profiles from a TEE to another compliant TEE. However, TEE profile migration implies security and privacy issues in particular for TEE profiles that require explicit agreement of the service provider. In this paper, we first present our perception of the deployment and implementation of a TEE: we organize the TEE into security domains with different roles and privileges. Based on this new model, we build a migration protocol of TEE profiles ensuring its confidentiality and integrity. To this end, we use a reencryption key and an authorization token per couple of devices, per service provider and per transfer. The proposed protocol has been successfully validated by AVISPA, an automated security protocol validation tool.
Document type :
Conference papers
Complete list of metadata
Contributor : Jean-François Lalande Connect in order to contact the contributor
Submitted on : Monday, January 23, 2017 - 2:55:01 PM
Last modification on : Thursday, January 20, 2022 - 5:33:25 PM
Long-term archiving on: : Monday, April 24, 2017 - 2:35:34 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Ghada Arfaoui, Jean-François Lalande, Saïd Gharout, Jacques Traoré. Practical and Privacy-Preserving TEE Migration. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩. ⟨hal-01183508⟩



Record views


Files downloads