2020 IEEE Symposium on Security and Privacy (SP) 2020
DOI: 10.1109/sp40000.2020.00061
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems

Abstract: Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments (TEEs) built with Arm TrustZone for the protection of security-critical applications (e.g., DRM) and operating system (OS) components (e.g., Android keystore). TEEs are often assumed to be highly secure; however, over the past years, TEEs have been successfully attacked multiple times, with highly damaging impact across various platforms. Unfortunately, these attacks have been possible by the presence of security flaws in T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
76
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 127 publications
(76 citation statements)
references
References 26 publications
0
76
0
Order By: Relevance
“…The focus of the above papers is different from our approach, as none of the three exposes the degree of vulnerability and the importance of the various TrustZone-based TEE solutions used in market deployed devices, while they fail to pinpoint common design flaws that lead to these vulnerabilities. Finally, concurrent to our work, Cerdeira et al [ 22 ] presented and provided a comprehensive taxonomy of TrustZone-based TEE vulnerabilities. The results of this paper are complementary to our research and analysis.…”
Section: Introductionmentioning
confidence: 82%
“…The focus of the above papers is different from our approach, as none of the three exposes the degree of vulnerability and the importance of the various TrustZone-based TEE solutions used in market deployed devices, while they fail to pinpoint common design flaws that lead to these vulnerabilities. Finally, concurrent to our work, Cerdeira et al [ 22 ] presented and provided a comprehensive taxonomy of TrustZone-based TEE vulnerabilities. The results of this paper are complementary to our research and analysis.…”
Section: Introductionmentioning
confidence: 82%
“…In particular, MCSFI only requires general-purpose registers; hence it can be extended to TEEs based on RISC-V CPUs, e.g., Sanctum [79] or Keystone [80]. Furthermore, CHANCEL can also be extended to ARM CPUs, like Native Client's extension [81], but existing ARM TEEs lack hardware memory encryption [82], crucial to ensure client data confidentiality on cloud machines. Importantly, CHANCEL's extension to RISC-V TEEs like Sanctum or Keystone would benefit both parties.…”
Section: Discussionmentioning
confidence: 99%
“…a smartphone), in an external element such as a flash memory card, in the circuitry of devices such as the SIM card itself used in mobile phones, or as a cloud service in Host Card Emulation technology. A new family of embedded environments known as Trusted Execution Environments (TEE) [25,26] has emerged. A TEE is a hardware environment with a secure operating system that is isolated and completely separated from the mobile platform.…”
Section: Secure Element As Trust Anchormentioning
confidence: 99%