论文地址:
The Security of ARM TrustZone in a FPGA-Based SoC2019 (1).pdf
$1 Introduction
This paper give many example of How the different aspects affect the security of the whole System, and can be read them in detail.
TrustZone: A hardware extension of ARM processors that help divide both hardware and software into two world(secure & non-secure),and TrustZone enable processor has a monitor mode that controls the interaction between the two world.
Advantages: provides a trusted execution environment
Example:
- secure data procession on the cloud
- implement Internet protocol security
- secure communication in software radio systems
$2 Possible threats to ARM TrustZone
2.1 TrustZone Security
2.1.1 System level
- non-secure code in a secure world by using a failure of handling integer overflows in Security Monitor Call request function(even security patch and privilege escalation)
cause a fault during execution to bypass the protection or to perform a cryptanalysis
- rowhammer( https://blog.csdn.net/u013806583/article/details/53103714) attack effect from a non-secure world can be used to attack a TrustZone secure world.(recover a private key stored in DRAM)
- side channels like cache-based attacks(two world share the same cache)
2.1.2 hardware level
physical side channel analysis
- CPA attacking an AES encryption
- attacking PIN algorithm using template attacks
fault injection attack
- electromagnetic injection
- target the control flow
2.2 FPGA intrinsic Security
- physical attacks(side channel,fault attacks)
- transfer of sensitive data