Great to see this subject covered in wikipedia. A technology in use in millions of devices, a massive percentage of the mobile market, and no mention in wikipedia, was crazy.
Comments on current text:
1] Sorry but I have to object to ARM, MIPS and Intel (??) processor capabilities being referred to as "Implementations". AFAIK they are all potential components of a TEE, how the device design makes use of them defines whether they create a TEE or not.
I could be wrong about Intel and MIPS but I assume they don't have secure boot built into the actual CPU/cores? If they don't then they aren't enough on there own to create a TEE and so aren't an implementation. You typically need to add ROM, some key chains and some sort of Trusted OS before you get device local assurance that you are running code you trust. --User:DonOnWikiP
- Agreed. The implementations are delivered TEE products, such as Trustonic's tBase-200, Qualcomm's QSEE etc.[1]
- The listed implementations are chip technology which could facilitate a TEE, but are not one themselves by the GlobalPlatform definition. I think the criteria is very simple - does the vendor describe it as a TEE? In which case it can be cited. --User:WikiSimonB
2] Standards - The first standard org to mention and specify a TEE AFAIK is OMTP. I could revise the Standards section and add some references to the OMTP ATE docs (currently hosted by GSMA) [2]. That would give a bit more history and background to the article. --User:DonOnWikiP
- Ok, I had a look for this, and OMTP TR1[3] refers to a 'Trusted Environment', which is not a 'Trusted Execution Environment', but I did find a presentation from GlobalPlatform that suggests it's origins were in the OMTP TR1 'Trusted Environment' [4] --User:WikiSimonB
- ? In TR1 Chapter 4 : title "TRUSTED EXECUTION ENVIRONMENTS" --User:DonOnWikiP
- Ah. Found a reference - the standard I linked to was TR0 - TR1 does indeed refer to TEE.[5] There's probably the basis of a history section from these links. --User:WikiSimonB....
3] Currently the article does not (to me) really explain the parameters as to why someone would should trust a TEE. Now while their are many TEE designs, they all should be following something like the ATE secure boot chain for the device to have assurance in their software (I think that includes "I am in ROM" as a very short trusted boot), and they should all have some sort of stated isolation capabilities (ideally either the OMTP ATE set or the GP TEE PP, but manufacturer self certified (yuk) is good enough in some markets) --User:DonOnWikiP
- Is this part of the formal definition, or just opinion? GlobalPlatform have a certification program which belongs in the article, in my view, but 'why someone would should trust a TEE' seems a bit subjective to me. --User:WikiSimonB
- Fair comment, to define the standard of trustworthiness OMTP basically lists TEE assets (ch 4.3) and a set of requirements to protect those assets and hence to qualify as an OMTP defn of a TEE (ch 4.4). See ATE-TEE-620 and 630 for "Flexible Secure Boot" requirements. GlobalPlatform has created a protection profile which I believe was originally based on the OMTP requirements (See the GP TEE System Arch doc definition of a TEE) --User:DonOnWikiP
I have some other comments but this will do for starters. --User:DonOnWikiP
- Please elaborate! --User:WikiSimonB
(Sorry if this post breaks some wiki etiquette - its years since I posted here)
DonOnWikiP (talk) 19:49, 6 August 2014 (UTC)