MVAM: Multi-variant Attacks on Memory for IoT Trust Computing

被引:0
|
作者
Sarker, Arup Kumar [1 ]
Islam, Md. Khairul [1 ]
Tian, Yuan [1 ]
Fox, Geoffrey [1 ]
机构
[1] Univ Virginia, Charlottesville, VA 22901 USA
关键词
D O I
10.1145/3576914.3587486
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growth of the Internet of Things (IoT) and the availability of low-cost cloud services have led to an increase in the sensory and data processing needs of IoT systems. TrustZone is a hardwarebased security solution designed for ARM processors in IoT handheld systems. It provides memory isolation to protect trusted application data from potential exploitation by malicious actors. This paper examines the vulnerabilities of the TrustZone extension of ARM Cortex-M processors and develops a threat model to carry out these attacks. After performing multi-variety attacks from different angles, it is found that TrustZone is susceptible to buffer overflow attacks that can compromise the security of other trusted apps. The vulnerabilities in TrustZone are attributed to the absence of validation for input parameters in the entry function and the failure to perform boundary-checking of memory allocation. The vulnerability known as Achilles' Heel can be found in any aspect of the TrustZone security system, making it susceptible to MOFlow attacks because the framework does not have adequate automatic safeguards in place. The proposed attacks were successfully tested on two recent ARM Cortex-M23 and M33 processors. Finally, a trust model is proposed to address these vulnerabilities.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [1] A Multi-variant Execution Environment for Securing In-memory KVSes
    Enomoto, Shuhei
    Yamada, Hiroshi
    [J]. 2022 18TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2022), 2022, : 9 - 16
  • [2] Multi-variant Execution at the Edge
    Cabrera-Arteaga, Javier
    Laperdrix, Pierre
    Monperrus, Martin
    Baudry, Benoit
    [J]. PROCEEDINGS OF THE 9TH ACM WORKSHOP ON MOVING TARGET DEFENSE, MTD 2022, 2022, : 11 - 22
  • [3] MULTI-VARIANT KINETIC ANALYSES ON A MICROCOMPUTER
    ALBIN, M
    GRAY, HB
    [J]. COMPUTERS & CHEMISTRY, 1989, 13 (03): : 173 - 177
  • [4] MULTI-VARIANT ANALYSIS OF PATIENT COMPLIANCE
    WANG, YF
    SCHOOLER, K
    [J]. GERONTOLOGIST, 1982, 22 : 161 - 162
  • [5] Decoupling of multi-variant control system
    Li, Xu
    Xiong, Zhong-Hui
    Gao, Sheng
    Xiao, Bai-Le
    [J]. Dongli Gongcheng/Power Engineering, 2003, 23 (02):
  • [6] A projected Newton algorithm for simulation of multi-variant textured polycrystalline shape memory alloys
    Mahnken, Rolf
    Wilmanns, Stefan
    [J]. COMPUTATIONAL MATERIALS SCIENCE, 2011, 50 (09) : 2535 - 2548
  • [7] SecMVX: Analysis on the Vulnerability of Multi-Variant Execution
    Li, Bingzheng
    Zhang, Zheng
    Wang, Xiaomei
    Qu, Sheng
    Wu, Jiangxing
    [J]. CHINA COMMUNICATIONS, 2021, 18 (08) : 85 - 95
  • [8] Multi-Variant Execution to Protect Unpatched Software
    Bauer, Kevin
    Dedhia, Veer
    Skowyra, Richard
    Streilein, William
    Okhravi, Hamed
    [J]. 2015 RESILIENCE WEEK (RSW), 2015, : 108 - 113
  • [9] Adaptability within a Multi-Variant Serial Production
    Dombrowski, U.
    Krenkel, P.
    Ebentreich, D.
    [J]. VARIETY MANAGEMENT IN MANUFACTURING: PROCEEDINGS OF THE 47TH CIRP CONFERENCE ON MANUFACTURING SYSTEMS, 2014, 17 : 124 - 129
  • [10] Data Randomization for Multi-Variant Execution Environment
    Hwang, Dongil
    Shin, Jangseop
    Kim, Jeehwan
    Paek, Yunheung
    [J]. 2019 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2019, : 291 - 292