Trusted Execution Environments (TEEs) such as Intel SGX and ARM Trustzone along with their underlying platforms claim secure application execution. However, as the underlying hardware resources are often shared the paramount context isolation is enforced, mostly, by software means through the underlying platform. This has resulted in a number of software-based attacks on the underlying technologies.
This project should examine how TEEs should enhance their underlying security offering and provide demonstrable recommendations for improvements in the overall integrity and confidentiality of the executed applications.
More specifically, this project will focus on TEEs and Secure Elements (SEs) and explore how their underlying software platforms can be potentially enhanced with micro kernel attestation mechanisms, and software (and hardware) countermeasures that will safeguard secure application and life cycle management (e.g. installation, execution, decommission). Furthermore, it will address issues surrounding the interplay between hardware and software based secure application execution mechanisms, hardware and software binding, control-flow verification, and integrity of the executed instructions for the protection of run-time data, for avionics, automotive, and Internet-of-Things.
We are now looking for highly talented applicants with a Computer Science, Information Security or electronic/computer engineering skills. The successful candidate will ideally have good practical skills (such as experience in software development, appreciation of the underlying hardware characteristics of execution environments, FPGA programming is desirable, but not essential), communication and team working skills. A strong interest in information security problems that aim to bridge theory and practice in embedded systems, IoTs, mobile devices, smart cards is essential. Prospective applicants are welcome to discuss this project with Prof Konstantinos Markantonakis