skip to main content
research-article

VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone

Published:29 September 2020Publication History
Skip Abstract Section

Abstract

Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this article, we propose an innovative software-controlled hardware fault-based attack, VoltJockey, on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency. We deliberately manipulate the processor voltage via DVFS to induce hardware faults into the victim cores, and therefore breaking TrustZone. The entire attack process is based on software without any involvement of hardware, which makes VoltJockey stealthy and hard to prevent.

References

  1. ARM, Architecture. "Security technology building a secure system using trustzone technology (white paper)." ARM Limited (2009).Google ScholarGoogle Scholar
  2. Dan Rosenberg. "Reflections on trusting trustzone." Black Hat Conference. 2014.Google ScholarGoogle Scholar
  3. Huasong Meng, et al. "A survey of Android exploits in the wild." 2018. Computers & Security, 76, 71--91.Google ScholarGoogle Scholar
  4. Dan Rosenberg. "Qsee trustzone kernel integer over flow vulnerability." Black Hat Conference. 2014.Google ScholarGoogle Scholar
  5. Moritz Lipp, et al. "Armageddon: Cache attacks on mobile devices." 2016. 25th USENIX Security Symposium (USENIX Security 16). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Adrian Tang, Simha Sethumadhavan, and Salvatore Stolfo. "CLKSCREW: Exposing the perils of security-oblivious energy management." 2017. 26th USENIX Security Symposium (USENIX Security 17). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Pengfei Qui, et al. "VoltJockey: Breaching Trust- Zone by software-controlled voltage manipulation over multi-core frequencies." 2019. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Inki Hong, et al. "Power optimization of variable-voltage core-based systems." 1999. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 18.12, 1702--1714. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jean Arlat, et al. "Fault injection for dependability validation: A methodology and some applications." 1990. IEEE Transactions on software engineering 16.2, 166--182. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Eli Biham and Adi Shamir. 2012. Differential cryptanalysis of the data encryption standard. Springer Science & Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Nidhal Selmane, Sylvain Guilley, and Jean-Luc Danger. "Practical setup time violation attacks on AES." 2008. 2008 Seventh European Dependable Computing Conference. IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Alessandro Barenghi, et al. "Low voltage fault attacks on the RSA cryptosystem." 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Alessandro Barenghi, et al. "Low voltage fault attacks to AES." 2010. 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE.Google ScholarGoogle Scholar
  14. Alessandro Barenghi, et al. "A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA." Journal of Systems and Software 86.7 (2013), 1864--1878. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image GetMobile: Mobile Computing and Communications
    GetMobile: Mobile Computing and Communications  Volume 24, Issue 2
    June 2020
    34 pages
    ISSN:2375-0529
    EISSN:2375-0537
    DOI:10.1145/3427384
    Issue’s Table of Contents

    Copyright © 2020 Copyright is held by the owner/author(s)

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 29 September 2020

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader