TruSense: Information Leakage from TrustZone

IEEE INFOCOM(2018)

引用 43|浏览42
暂无评分
摘要
With the emergence of Internet of Things, mobile devices are generating more network traffic than ever. TrustZone is a hardware-enabled trusted execution environment for ARM processors. While TrustZone is effective in providing the much-needed memory isolation, we observe that it is possible to derive secret information from secure world using the cache contention, due to its high-performance cache sharing design. In this work, we propose TruSense to study the timing-based cache side-channel information leakage of TrustZone. TruSense can be launched from not only the normal world operating system but also a non-privileged user application. Without access to virtual-to-physical address mapping in user applications, we devise a novel method that uses the expected channel statistics to allocate memory for cache probing. We also show how an attacker might use the less accurate performance event interface as a timer. Using the T-table based AES implementation in OpenSSL 1.0.1f as an example, we demonstrate how a normal world attacker can steal fine-grained secret in the secure world. We also discuss possible mitigations for the information leakage.
更多
查看译文
关键词
TruSense,TrustZone,mobile devices,ARM processors,memory isolation,cache contention,high-performance cache sharing design,timing-based cache side-channel information leakage,nonprivileged user application,cache probing,hardware-enabled trusted execution,Internet of Things,T-table based AES implementation,OpenSSL 1.0
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要