作者
Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y Thomas Hou
发表日期
2016
期刊
Cryptology ePrint Archive
简介
As smart, embedded devices are increasingly integrated into our daily life, the security of these devices has become a major concern. The ARM processor family, which powers more than 60% of embedded devices, introduced TrustZone technology to offer security protection via an isolated execution environment called secure world. Caches in TrustZone-enabled processors are extended with a non-secure (NS) bit to indicate whether a cache line is used by the secure world or the normal world. This cache design improves system performance by eliminating the need to perform cache flush during world switches; however, it also enables cache contention between the two worlds. In this work, we present TruSpy, the first study of timingbased cache side-channel information leakage of TrustZone. Our proposed attack exploits the cache contention between normal world and secure world to recover secret information from secure world. Two attacks are proposed in TruSpy, namely, the normal world OS attack and the normal world Android app attack. In the OS-based attack, the attacker is able to access virtual-to-physical address translation and high precision timers. In the Android app-based attack, these tools are unavailable to the attacker, so we devise a novel method that uses the expected channel statistics to allocate memory for cache probing. We also show how an attacker might use the less accurate performance event interface as a timer. Using the T-table based AES implementation in OpenSSL 1.0. 1f as an example, we demonstrate that it is possible for a normal world attacker to steal a fine-grained secret from the secure world using a …
引用总数
20172018201920202021202220232024712212634442425
学术搜索中的文章
N Zhang, K Sun, D Shands, W Lou, YT Hou - IEEE INFOCOM 2018-IEEE conference on computer …, 2018