The Security of ARM TrustZone in a FPGA-Based SoC. Benhani, E. M., Bossuet, L., & Aubert, A. IEEE Transactions on Computers, 68(8):1238–1248, August, 2019.
doi  abstract   bibtex   
Cybersecurity of embedded systems has become a major challenge for the development of the Internet of Things, of Cloud computing and other trendy applications without devoting a significant part of the design budget to industrial players. Technologies like TrustZone, provided by ARM, support a Trusted Execution Environment (TEE) software architecture and are inexpensive integrated solutions. While this technology allows isolation and secure execution of critical software applications (e.g., banking), recent preliminary works highlighted some security breaches or limitations when the ARM processors are embedded in a FPGA-based heterogeneous SoCs such as the Xilinx Zynq or Intel SoC FPGA devices. This paper highlights the security issue of such complex SoCs and details six efficient attacks on the ARM TrustZone extension in the SoC. A prototype system design on a Xilinx Zynq SoC is the target of the attacks presented in this paper but they could be adapted to other SoCs. This paper also includes recommendations and security solutions to design a trustworthy embedded system with a FPGA-based heterogeneous SoC.
@article{benhani_security_2019,
	title = {The {Security} of {ARM} {TrustZone} in a {FPGA}-{Based} {SoC}},
	volume = {68},
	issn = {0018-9340},
	doi = {10.1109/TC.2019.2900235},
	abstract = {Cybersecurity of embedded systems has become a major challenge for the development of the Internet of Things, of Cloud computing and other trendy applications without devoting a significant part of the design budget to industrial players. Technologies like TrustZone, provided by ARM, support a Trusted Execution Environment (TEE) software architecture and are inexpensive integrated solutions. While this technology allows isolation and secure execution of critical software applications (e.g., banking), recent preliminary works highlighted some security breaches or limitations when the ARM processors are embedded in a FPGA-based heterogeneous SoCs such as the Xilinx Zynq or Intel SoC FPGA devices. This paper highlights the security issue of such complex SoCs and details six efficient attacks on the ARM TrustZone extension in the SoC. A prototype system design on a Xilinx Zynq SoC is the target of the attacks presented in this paper but they could be adapted to other SoCs. This paper also includes recommendations and security solutions to design a trustworthy embedded system with a FPGA-based heterogeneous SoC.},
	number = {8},
	journal = {IEEE Transactions on Computers},
	author = {Benhani, E. M. and Bossuet, L. and Aubert, A.},
	month = aug,
	year = {2019},
	keywords = {ARM TrustZone, ARM TrustZone extension, ARM processors, FPGA Security, FPGA-based heterogeneous SoC, Fabrics, Field programmable gate arrays, Hardware, IP networks, Intel SoC FPGA devices, Internet of Things, Program processors, Security, TEE software architecture, Xilinx Zynq SoC, cloud computing, embedded system design, embedded systems, field programmable gate arrays, security issue, software architecture, system-on-chip, trusted computing, trusted execution environment, trustworthy embedded system},
	pages = {1238--1248},
}

Downloads: 0