I have been searching much about android secure architecture and i know that the new android devices use a hardware backed keyStore in TrustZone (TEE) to store the keys on it. The question is where this secure hardware storage is located, and what do they call this secure hardware?
Where secure hardware storage located?
338 Views Asked by Shorouq At
1
There are 1 best solutions below
Related Questions in ANDROID
- Creating global Class holder
- Flutter + Dart: Editing name of a tab shows up a black screen
- android-pdf-viewer Received status code 401 from server: Unauthorized
- Sdk 34 WRITE_EXTERNAL_STORAGE not working
- ussd reader in Recket Native module
- Incorrect display of LinearGradientBrush in IOS
- The Binary Version Of its metadata is 1.8.0, expected Version is 1.6.0 build error
- I can't make TextInput to auto expand properly in Android
- Creating multiple instances of a class with different initializing values in Flutter
- How to create a lottie animation
- making android analyze with coverity sast tool
- Flutter plugin development android src not opening after opening example
- I initialize my ViewModel in the Activity with several fragments as tabs, but the fragments(tabs) return null for the updated livedata
- Node.js Server + Socket.IO + Android Mobile Applicatoin XHR Polling Error...?
- How I can use the shared preferences class?
Related Questions in KEYSTORE
- PKIX failed when using custom SSLcontext with custom keyStore and trustStore
- Authentication with SmartCard sending a SOAPUI request
- debug.keystore does not exist at default location
- How to load certificate from the resources folder (and how to regenerate them)?
- JCE: Store a private-key only without cert-chain
- Having an error of "PKIX path building failed: ...SunCertPathBuilderException: unable to find valid certification path to requested target"
- Why isn't my docker finding certificate store when running Java? What should I add to the docker creation or invocation?
- Which is more secure: EncryptedSharedPreferences or storing directly in KeyStore?
- Wweblogic: weblogic.xml.crypto.wss.WSSecurityConfigurationException: failed to get trusted CAs
- Unable to connect to kafka broker even after the certificate is imported
- Using keyStore as a repository for keys and certificate
- Cannot export pem certification for jks
- How to include a certificate in a jar keystore
- How do I get the password to upload keystore file (keystore password incorrect)
- Encrypting KeyStore Password in tomcat in server.xml in a secure way
Related Questions in SECURE-ELEMENT
- Azure IotHub and ATECC608B
- F/MiTeeESE-HAL(13055): Error while registering secure_element V1.2 service: -2147483648
- How to get the 64-byte signature from secure element (ATECC608B) in esp-idf
- Mosquitto bridge with OpenSSL
- What is CPLC (Card Product Life Cycle data) ? What is the use of CPLC in NFC enabled smartphone?
- Sending data, using HCE, or using secure element? (Android, Kotlin, Mifare 1k)
- Can a web app use the Secure Element (or Enclave) through a mobile browser?
- NFC Tap and Pay Broadcast Receiver
- Use hardware-backed keys in SSLContext
- List of Android smart phones that support Android StrongBox on API 28(Android Pie)
- How to load a Java Card applet into the Samsung S8 embedded secure element
- What can I do with OMAPI on Android Pixel 3 secure element?
- How to identify Secure Elements?
- How many Android 6+ devices have a TEE/SE?
- How to use Executor in SEservice (Open Mobile API for Android 9.0)
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular # Hahtags
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
There is no single answer to that, since it depends on the use case and the hardware capabilities where the TEE is running. OP-TEE for example use both regular flash as well as RPMB for secure storage (in both cases everything is encrypted and integrity protected since the data in transfer are handled in non-secure world also).
Since flash is both in theory and in practice replaceable and modifiable, that is not a good place to store keys that should be bound to the device (again, depends on use case). In that case it is better to use RPMB which is tamper-proof and uses a uniquely derived shared key between the TEE and the RPMB to authenticate all messages.
I believe this is a pretty common way of dealing with secure storage in TrustZone solutions. But, I have also heard about TEE's having access to TEE dedicated flash etc.