On Runtime Software Security of TrustZone-M based IoT Devices

07/12/2020
by   Lan Luo, et al.
0

Internet of Things (IoT) devices have been increasingly integrated into our daily life. However, such smart devices suffer a broad attack surface. Particularly, attacks targeting the device software at runtime are challenging to defend against if IoT devices use resource-constrained microcontrollers (MCUs). TrustZone-M, a TrustZone extension for MCUs, is an emerging security technique fortifying MCU based IoT devices. This paper presents the first security analysis of potential software security issues in TrustZone-M enabled MCUs. We explore the stack-based buffer overflow (BOF) attack for code injection, return-oriented programming (ROP) attack, heap-based BOF attack, format string attack, and attacks against Non-secure Callable (NSC) functions in the context of TrustZone-M. We validate these attacks using the TrustZone-M enabled SAM L11 MCU. Strategies to mitigate these software attacks are also discussed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/30/2017

Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems

Denial of Service (DoS) attacks constitute a major security threat to to...
research
04/19/2021

The Impact of DoS Attacks onResource-constrained IoT Devices:A Study on the Mirai Attack

Mirai is a type of malware that creates a botnet of internet-connected d...
research
10/11/2020

Improved Fault Analysis on SIMECK Ciphers

The advances of the Internet of Things (IoT) have had a fundamental impa...
research
05/14/2021

Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies

Internet of Things (IoT) devices are becoming ubiquitous in our lives, w...
research
06/30/2021

A Context-Aware Information-Based Clone Node Attack Detection Scheme in Internet of Things

The rapidly expanding nature of the Internet of Things (IoT) networks is...
research
10/04/2018

Shakedown: compiler-based moving target protection for Return Oriented Programing attacks on an industrial IoT device

Cybercriminals use Return Oriented Programming techniques to attack syst...
research
01/27/2022

A TOCTOU Attack on DICE Attestation

A major security challenge for modern Internet of Things (IoT) deploymen...

Please sign up or login with your details

Forgot password? Click here to reset