The Security of ARM TrustZone in a FPGA-Based SoC2019

The Security of ARM TrustZone in a FPGA-Based SoC2019 (1).pdf

$1 Introduction

This paper give many example of How the different aspects affect the security of the whole System, and can be read them in detail.

TrustZone: A hardware extension of ARM processors that help divide both hardware and software into two world(secure & non-secure),and TrustZone enable processor has a monitor mode that controls the interaction between the two world.

Advantages: provides a trusted execution environment


  1. secure data procession on the cloud
  2. implement Internet protocol security
  3. secure communication in software radio systems

$2 Possible threats to ARM TrustZone

2.1 TrustZone Security

2.1.1 System level

  1. non-secure code in a secure world by using a failure of handling integer overflows in Security Monitor Call request function(even security patch and privilege escalation)
  2. cause a fault during execution to bypass the protection or to perform a cryptanalysis

  3. side channels like cache-based attacks(two world share the same cache)

2.1.2 hardware level

  1. physical side channel analysis

    • CPA attacking an AES encryption
    • attacking PIN algorithm using template attacks
  2. fault injection attack

    • electromagnetic injection
    • target the control flow

2.2 FPGA intrinsic Security

  • physical attacks(side channel,fault attacks)
  • transfer of sensitive data

2.3 FPGA-Based SoC Security

版权属于:Jtripper 所有,转载请注明文章来源。


赞 (0)