MVAM: Multi-variant Attacks on Memory for IoT Trust Computing

被引:0
|
作者
Sarker, Arup Kumar [1 ]
Islam, Md. Khairul [1 ]
Tian, Yuan [1 ]
Fox, Geoffrey [1 ]
机构
[1] Univ Virginia, Charlottesville, VA 22901 USA
关键词
D O I
10.1145/3576914.3587486
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growth of the Internet of Things (IoT) and the availability of low-cost cloud services have led to an increase in the sensory and data processing needs of IoT systems. TrustZone is a hardwarebased security solution designed for ARM processors in IoT handheld systems. It provides memory isolation to protect trusted application data from potential exploitation by malicious actors. This paper examines the vulnerabilities of the TrustZone extension of ARM Cortex-M processors and develops a threat model to carry out these attacks. After performing multi-variety attacks from different angles, it is found that TrustZone is susceptible to buffer overflow attacks that can compromise the security of other trusted apps. The vulnerabilities in TrustZone are attributed to the absence of validation for input parameters in the entry function and the failure to perform boundary-checking of memory allocation. The vulnerability known as Achilles' Heel can be found in any aspect of the TrustZone security system, making it susceptible to MOFlow attacks because the framework does not have adequate automatic safeguards in place. The proposed attacks were successfully tested on two recent ARM Cortex-M23 and M33 processors. Finally, a trust model is proposed to address these vulnerabilities.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [41] A multi-variant martensitic phase transformation model: formulation and numerical implementation
    Govindjee, S
    Miehe, C
    [J]. COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 2001, 191 (3-5) : 215 - 238
  • [42] Multi-variant network address hopping to defend stealthy crossfire attack
    Boyang ZHOU
    Gaoning PAN
    Chunming WU
    Kai ZHU
    Wei RUAN
    [J]. Science China(Information Sciences), 2020, 63 (06) : 241 - 243
  • [43] An improved CACO algorithm based on adaptive method and multi-variant strategies
    Wu Deng
    Huimin Zhao
    Jingjing Liu
    Xiaolin Yan
    Yuanyuan Li
    Lifeng Yin
    Chuanhua Ding
    [J]. Soft Computing, 2015, 19 : 701 - 713
  • [44] CARDIO-VASCULAR RISK IN GEORGIAN POPULATION: MULTI-VARIANT ANALYSES
    Sturua, L.
    Topuridze, M.
    Trapaidze, D.
    Shishniashvili, M.
    [J]. JOURNAL OF HYPERTENSION, 2015, 33 : E143 - E143
  • [45] Ultra high porosity, multi-variant MOFs and conducting porous materials
    Gandara, F.
    Yaghi, O. M.
    [J]. ACTA CRYSTALLOGRAPHICA A-FOUNDATION AND ADVANCES, 2011, 67 : C377 - C378
  • [46] A uniform representation of multi-variant data in intensive-query databases
    Chakraborty, Supriya
    Cortesi, Agostino
    Chaki, Nabedu
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2016, 12 (03) : 163 - 176
  • [47] An improved CACO algorithm based on adaptive method and multi-variant strategies
    Deng, Wu
    Zhao, Huimin
    Liu, Jingjing
    Yan, Xiaolin
    Li, Yuanyuan
    Yin, Lifeng
    Ding, Chuanhua
    [J]. SOFT COMPUTING, 2015, 19 (03) : 701 - 713
  • [48] Supporting the Regression Test of Multi-Variant Systems in Distributed Production Scenarios
    Abele, Sebastian
    Weyrich, Michael
    [J]. 2016 IEEE 21ST INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2016,
  • [49] Multi-variant Optimization Algorithm for Three Dimensional Container Loading Problem
    Li, Sun-Cun
    Shi, Xin-Ling
    Zhang, Song-Hai
    Dong, Yi
    Gao, Lian
    [J]. Zidonghua Xuebao/Acta Automatica Sinica, 2018, 44 (01): : 106 - 115
  • [50] Multi-variant network address hopping to defend stealthy crossfire attack
    Boyang Zhou
    Gaoning Pan
    Chunming Wu
    Kai Zhu
    Wei Ruan
    [J]. Science China Information Sciences, 2020, 63