The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
A arquitetura ARM TrustZone, que fornece isolamento assistido por hardware, é amplamente adotada em dispositivos móveis e IoT. A segurança do ARM TrustZone depende da ideia de dividir o hardware e software do sistema no chip em dois mundos, ou seja, o mundo normal e o mundo seguro. Existem canais legítimos no nível do hardware que o mundo normal e o mundo seguro podem usar para se comunicarem. Para proteger estes canais de abusos, foram investidos esforços de investigação na restrição do acesso a estes canais por parte de componentes normais do mundo. Portanto, apenas componentes do mundo normal predefinidos e legítimos podem usar canais de comunicação entre mundos. Neste trabalho, apresentamos um estudo sobre canais secretos de dados que podem contornar tais mecanismos de proteção e contrabandear informações confidenciais. Primeiro analisamos as causas do ruído no canal secreto entre dois mundos. Em seguida, avaliamos a precisão e a largura de banda dos canais secretos construídos pelo nosso método PRIME+COUNT com um construído pelo método PRIME+PROBE. Nossos resultados demonstram que PRIME+COUNT é uma técnica eficaz para habilitar canais secretos entre mundos no ARM TrustZone.
Haehyun CHO
Soongsil University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Haehyun CHO, "Data Covert Channels between the Secure World and the Normal World in the ARM TrustZone Architecture" in IEICE TRANSACTIONS on Information,
vol. E105-D, no. 11, pp. 1925-1927, November 2022, doi: 10.1587/transinf.2022NGL0002.
Abstract: The ARM TrustZone architecture, which provides hardware-assisted isolation, is widely adopted in mobile and IoT devices. The security of ARM TrustZone relies on the idea of splitting system-on-chip hardware and software into two worlds, namely normal world and secure world. There are legitimate channels at the hardware level that the normal world and the secure world can use to communicate with each other. To protect these channels from being abused, research efforts were invested on restricting the access to these channels from normal world components. Therefore, only predefined and legitimate normal world components can use cross-world communication channels. In this work, we present a study on data covert channels that can bypass such protection mechanisms and smuggle sensitive information. We first analyze causes of the noise in the covert channel between two worlds. Then, we evaluate the accuracy and bandwidth of covert channels built by our PRIME+COUNT method with one built by PRIME+PROBE method. Our results demonstrate that PRIME+COUNT is an effective technique for enabling cross-world covert channels in the ARM TrustZone.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2022NGL0002/_p
Copiar
@ARTICLE{e105-d_11_1925,
author={Haehyun CHO, },
journal={IEICE TRANSACTIONS on Information},
title={Data Covert Channels between the Secure World and the Normal World in the ARM TrustZone Architecture},
year={2022},
volume={E105-D},
number={11},
pages={1925-1927},
abstract={The ARM TrustZone architecture, which provides hardware-assisted isolation, is widely adopted in mobile and IoT devices. The security of ARM TrustZone relies on the idea of splitting system-on-chip hardware and software into two worlds, namely normal world and secure world. There are legitimate channels at the hardware level that the normal world and the secure world can use to communicate with each other. To protect these channels from being abused, research efforts were invested on restricting the access to these channels from normal world components. Therefore, only predefined and legitimate normal world components can use cross-world communication channels. In this work, we present a study on data covert channels that can bypass such protection mechanisms and smuggle sensitive information. We first analyze causes of the noise in the covert channel between two worlds. Then, we evaluate the accuracy and bandwidth of covert channels built by our PRIME+COUNT method with one built by PRIME+PROBE method. Our results demonstrate that PRIME+COUNT is an effective technique for enabling cross-world covert channels in the ARM TrustZone.},
keywords={},
doi={10.1587/transinf.2022NGL0002},
ISSN={1745-1361},
month={November},}
Copiar
TY - JOUR
TI - Data Covert Channels between the Secure World and the Normal World in the ARM TrustZone Architecture
T2 - IEICE TRANSACTIONS on Information
SP - 1925
EP - 1927
AU - Haehyun CHO
PY - 2022
DO - 10.1587/transinf.2022NGL0002
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E105-D
IS - 11
JA - IEICE TRANSACTIONS on Information
Y1 - November 2022
AB - The ARM TrustZone architecture, which provides hardware-assisted isolation, is widely adopted in mobile and IoT devices. The security of ARM TrustZone relies on the idea of splitting system-on-chip hardware and software into two worlds, namely normal world and secure world. There are legitimate channels at the hardware level that the normal world and the secure world can use to communicate with each other. To protect these channels from being abused, research efforts were invested on restricting the access to these channels from normal world components. Therefore, only predefined and legitimate normal world components can use cross-world communication channels. In this work, we present a study on data covert channels that can bypass such protection mechanisms and smuggle sensitive information. We first analyze causes of the noise in the covert channel between two worlds. Then, we evaluate the accuracy and bandwidth of covert channels built by our PRIME+COUNT method with one built by PRIME+PROBE method. Our results demonstrate that PRIME+COUNT is an effective technique for enabling cross-world covert channels in the ARM TrustZone.
ER -