@inproceedings{f0900be83e594ce08a41d05696a66cb9,
title = "Using Trusted Execution Environments in Two-factor Authentication: comparing approaches",
abstract = "Classic two-factor authentication has been around for a long time and has enjoyed success in certain markets (such as the corporate and the banking environ- ment). A reason for this success are the strong security properties, particularly where user interaction is concerned. These properties hinge on a security token being a physi- cally separate device. This paper investigates whether Trusted Execution Environments (TEE) can be used to achieve a comparable level of security without the need to have a separate device. To do this, we introduce a model that shows the security properties of user interaction in two-factor authentication. The model is used to examine two TEE technologies, Intel{\textquoteright}s IPT and ARM TrustZone, revealing that, although it is possible to get close to classic two-factor authentication in terms of user interaction security, both technologies have distinct drawbacks. The model also clearly shows an open problem shared by many TEEs: how to prove to the user that they are dealing with a trusted application when trusted and untrusted applications share the same display.",
keywords = "EWI-25012, trusted execution environment, two-factor authentication, METIS-306007, Intel Identity Protection Technology, ARM TrustZone, IR-91957, IPT",
author = "{van Rijswijk}, {Roland M.} and Erik Poll",
year = "2013",
month = sep,
language = "Undefined",
isbn = "978-3-88579-617-6",
series = "Lecture Notes in Informatics",
publisher = "Gesellschaft for Informatik",
pages = "20--31",
booktitle = "Proceedings of the Open Identity Summit 2013 (OID 2013)",
note = "Open Identity Summit 2013, OID 2013 ; Conference date: 09-09-2013 Through 11-09-2013",
}