A survey on the (in)security of trusted execution environments

被引:19
|
作者
Munoz, Antonio [1 ]
Rios, Ruben [1 ]
Roman, Rodrigo [1 ]
Lopez, Javier [1 ]
机构
[1] Univ Malaga, Network Informat & Comp Secur NICS Lab, Malaga, Spain
关键词
Computer security; Secure hardware; Trusted execution environments; Hardware attacks; Software attacks; Side -channel attacks; COLLISION TIMING ATTACKS; MOBILE; PROTECTION;
D O I
10.1016/j.cose.2023.103180
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the number of security and privacy attacks continue to grow around the world, there is an ever in-creasing need to protect our personal devices. As a matter of fact, more and more manufactures are relying on Trusted Execution Environments (TEEs) to shield their devices. In particular, ARM TrustZone (TZ) is being widely used in numerous embedded devices, especially smartphones, and this technology is the basis for secure solutions both in industry and academia. However, as shown in this paper, TEE is not bullet-proof and it has been successfully attacked numerous times and in very different ways. To raise awareness among potential stakeholders interested in this technology, this paper provides an extensive analysis and categorization of existing vulnerabilities in TEEs and highlights the design flaws that led to them. The presented vulnerabilities, which are not only extracted from existing literature but also from publicly available exploits and databases, are accompanied by some effective countermeasures to reduce the likelihood of new attacks. The paper ends with some appealing challenges and open issues. (c) 2023 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )
引用
收藏
页数:26
相关论文
共 50 条
  • [21] Trusted Deep Neural Execution-A Survey
    Babar, Mohammad Fakhruddin
    Hasan, Monowar
    IEEE ACCESS, 2023, 11 : 45736 - 45748
  • [22] Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments
    Shepherd, Carlton
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [23] Automated Partitioning of Android Applications for Trusted Execution Environments
    Rubinov, Konstantin
    Rosculete, Lucia
    Mitra, Tulika
    Roychoudhury, Abhik
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, : 923 - 934
  • [24] Cracking-Like Join for Trusted Execution Environments
    Maliszewski, Kajetan
    Quiane-Ruiz, Jorge-Arnulfo
    Markl, Volker
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (09): : 2330 - 2343
  • [25] Information Flow Control for Distributed Trusted Execution Environments
    Gollamudi, Anitha
    Chong, Stephen
    Arden, Owen
    2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 304 - 318
  • [26] TEE-Perf: A Profiler for Trusted Execution Environments
    Bailleu, Maurice
    Dragoti, Donald
    Bhatotia, Pramod
    Fetzer, Christof
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 414 - 421
  • [27] On Making Emerging Trusted Execution Environments Accessible to Developers
    Nyman, Thomas
    McGillion, Brian
    Asokan, N.
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 58 - 67
  • [28] Obscuro: A Bitcoin Mixer using Trusted Execution Environments
    Tran, Muoi
    Luu, Loi
    Kang, Min Suk
    Bentov, Iddo
    Saxena, Prateek
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 692 - 701
  • [29] Keystone: An Open Framework for Architecting Trusted Execution Environments
    Lee, Dayeol
    Kohlbrenner, David
    Shinde, Shweta
    Asanovic, Krste
    Song, Dawn
    PROCEEDINGS OF THE FIFTEENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS'20), 2020,
  • [30] SeRoT: A Secure Runtime System on Trusted Execution Environments
    Liu, Jingbin
    Qin, Yu
    Feng, Dengguo
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 30 - 37