Trusted Computing Base (TCB) is one of many ways to establish trust in a system, which in turn may be used to make a system secure. Typically a reliable TCB is one that has its root based in a reliable hardware. Different hardware architectures create a TCB in different ways; almost all recent ARM architectures (that are the core of more than 90% of consumer electronics devices) implement a technology called "TrustZone®" to establish a TCB, and call it a Trusted Execution Environment or TEE. Similar to any hardware, TrustZone®-enabled devices require a software stack to operate and expose their functionality. In this session we will briefly describe TrustZone and how it works and propose an open source implementation of TEE called Trusted Little Kernel (TLK.)
Speaker Bio Hadi Nahari, Chief Security Architect, NVIDIA
Hadi Nahari is a security professional with 20 years of experience in software development including extensive work in design and architecture, verification, proof-of-concept, and implementation of secure systems. Hadi has worked on large scale, high-end enterprise solutions, as well as resource-constrained embedded systems, with primary focus on security, cryptography, complex systems design, and vulnerability assessment & threat analysis. Author of the book: Web Commerce Security: Design & Development, published by John Wiley & Sons, Hadi is a frequent speaker in U.S. and international security, mobile, and payment events and has led and contributed to various security projects for Netscape Communications, Sun Microsystems, United States Government, Motorola, MontaVista, eBay, PayPal, and NVIDIA among others. Hadi is currently in charge of the security architecture and strategy of Mobile and Software Solutions at NVIDIA as Chief Security Architect.