MVAM: Multi-variant Attacks on Memory for IoT Trust Computing

01/11/2023
by   Arup Kumar Sarker, et al.
0

With the significant development of the Internet of Things and low-cost cloud services, the sensory and data processing requirements of IoT systems are continually going up. TrustZone is a hardware-protected Trusted Execution Environment (TEE) for ARM processors specifically designed for IoT handheld systems. It provides memory isolation techniques to protect trusted application data from being exploited by malicious entities. In this work, we focus on identifying different vulnerabilities of the TrustZone extension of ARM Cortex-M processors. Then design and implement a threat model to execute those attacks. We have found that TrustZone is vulnerable to buffer overflow-based attacks. We have used this to create an attack called MOFlow and successfully leaked the data of another trusted app. This is done by intentionally overflowing the memory of one app to access the encrypted memory of other apps inside the secure world. We have also found that, by not validating the input parameters in the entry function, TrustZone has exposed a security weakness. We call this Achilles heel and present an attack model showing how to exploit this weakness too. Our proposed novel attacks are implemented and successfully tested on two recent ARM Cortex-M processors available on the market (M23 and M33).

READ FULL TEXT

page 1

page 5

page 6

research
08/26/2019

Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks

In this paper, we propose a framework called Contego-TEE to secure Inter...
research
03/14/2023

Software-based security approach for networked embedded devices

As the Internet of Things (IoT) continues to expand, data security has b...
research
09/12/2022

Bao-Enclave: Virtualization-based Enclaves for Arm

General-purpose operating systems (GPOS), such as Linux, encompass sever...
research
02/04/2021

App Developer Centric Trusted Execution Environment

ARM TrustZone is the de-facto hardware TEE implementation on mobile devi...
research
07/17/2017

Downgrade Attack on TrustZone

Security-critical tasks require proper isolation from untrusted software...
research
08/01/2020

CROSSLINE: Breaking ”Security-by-Crash” based Memory Isolation in AMD SEV

AMD's Secure Encrypted Virtualization (SEV) is an emerging security feat...
research
06/26/2021

Evaluation of Cache Attacks on Arm Processors and Secure Caches

Timing-based side and covert channels in processor caches continue to be...

Please sign up or login with your details

Forgot password? Click here to reset