VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone

Pengfei Qiu, Dongsheng Wang, Yongqiang Lyu, G. Qu
{"title":"VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone","authors":"Pengfei Qiu, Dongsheng Wang, Yongqiang Lyu, G. Qu","doi":"10.1145/3427384.3427394","DOIUrl":null,"url":null,"abstract":"30 Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this article, we propose an innovative software-controlled hardware fault-based attack, VoltJockey, on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency. We deliberately manipulate the processor voltage via DVFS to induce hardware faults into the victim cores, and therefore breaking TrustZone. The entire attack process is based on software without any involvement of hardware, which makes VoltJockey stealthy and hard to prevent. We implement VoltJockey on an ARMbased processor from a commodity Android phone and demonstrate how to reveal the AES key from TrustZone and how to breach the RSA-based TrustZone authentication. These results suggest that VoltJockey has a comparable efficiency to side channels in obtaining TrustZone-guarded credentials, as well as the potential of bypassing the RSA-based verification to load untrusted applications into TrustZone. [HIGHLIGHTS]","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"GetMobile Mob. Comput. Commun.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3427384.3427394","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

30 Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this article, we propose an innovative software-controlled hardware fault-based attack, VoltJockey, on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency. We deliberately manipulate the processor voltage via DVFS to induce hardware faults into the victim cores, and therefore breaking TrustZone. The entire attack process is based on software without any involvement of hardware, which makes VoltJockey stealthy and hard to prevent. We implement VoltJockey on an ARMbased processor from a commodity Android phone and demonstrate how to reveal the AES key from TrustZone and how to breach the RSA-based TrustZone authentication. These results suggest that VoltJockey has a comparable efficiency to side channels in obtaining TrustZone-guarded credentials, as well as the potential of bypassing the RSA-based verification to load untrusted applications into TrustZone. [HIGHLIGHTS]
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
滥用处理器电压打破手臂的信任区
基于硬件分离的概念,ARM引入了TrustZone,为应用程序建立一个可信的执行环境。它在防御各种软件攻击和迫使攻击者探索接口设计和侧通道中的漏洞方面非常成功。在本文中,我们提出了一种创新的基于软件控制硬件故障的攻击,voljockey,针对采用动态电压和频率缩放(DVFS)技术提高能效的多核处理器。我们故意通过DVFS操纵处理器电压,将硬件故障引入受害核心,从而破坏TrustZone。整个攻击过程是基于软件的,没有任何硬件的参与,这使得voljockey隐形,难以预防。我们在基于arm的处理器上实现了voljockey,并演示了如何从TrustZone泄露AES密钥以及如何破坏基于rsa的TrustZone认证。这些结果表明,在获取TrustZone保护的凭据方面,voljockey具有与侧通道相当的效率,以及绕过基于rsa的验证以将不受信任的应用程序加载到TrustZone的潜力。(强调)
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone BoostMeUp: A Smartwatch App to Regulate Emotions and Improve Cognitive Performance eBP: Frequent and Comfortable Blood Pressure Monitoring from Inside Human's Ears CONTINUOUS AND PASSIVE BLOOD PRESSURE MONITORING THROUGHOUT THE DAY AND NIGHT EXPERIMENTAL SUPPLEMENTS From Mobile Tools for Cognitive Introspection Towards Cognitive Augmentation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1