Nov. 20, 2023, 2:10 a.m. | Davide Bove

cs.CR updates on arXiv.org arxiv.org

In the realm of mobile security, where OS-based protections have proven
insufficient against robust attackers, Trusted Execution Environments (TEEs)
have emerged as a hardware-based security technology. Despite the industry's
persistence in advancing TEE technology, the impact on end users and developers
remains largely unexplored. This study addresses this gap by conducting a
large-scale analysis of TEE utilization in Android applications, focusing on
the key areas of cryptography, digital rights management, biometric
authentication, and secure dialogs.


To facilitate our extensive analysis, …

android attackers developers end environments features hardware impact industry large mobile mobile security persistence realm scale security security technology study technology

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Senior Software Engineer, Security

@ Niantic | Zürich, Switzerland

Consultant expert en sécurité des systèmes industriels (H/F)

@ Devoteam | Levallois-Perret, France

Cybersecurity Analyst

@ Bally's | Providence, Rhode Island, United States

Digital Trust Cyber Defense Executive

@ KPMG India | Gurgaon, Haryana, India

Program Manager - Cybersecurity Assessment Services

@ TestPros | Remote (and DMV), DC