谷歌浏览器插件
订阅小程序
在清言上使用

Breaking TrustZone Memory Isolation through Malicious Hardware on a Modern FPGA-SoC

Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop(2019)

引用 13|浏览49
暂无评分
摘要
FPGA-SoCs are heterogeneous computing systems consisting of reconfigurable hardware and high performance processing units. This combination enables a flexible design methodology for embedded systems. However, the sharing of resources between these heterogeneous systems opens the door to attacks from one system on the other. This work considers Direct Memory Access attacks from a malicious hardware block inside the reconfigurable logic on the CPU. Previous works have shown similar attacks on FPGA-SoCs containing no memory isolation between the FPGA and the CPU. Our work studies the same idea on a system based on the Xilinx Zynq Ultrascale+ architecture. This platform contains memory isolation mechanisms such as a system memory management unit, memory protection units and supports ARM TrustZone technology. Despite the existence of these protection mechanisms, the two attacks presented in this work show that a malicious hardware block can still interfere with a security critical task executed on the CPU inside ARM TrustZone
更多
查看译文
关键词
dma attack, fpga-socs, hardware trojan, memory isolation, trusted execution environment, trustzone
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要