Authors
David Cerdeira, Nuno Santos, Pedro Fonseca, Sandro Pinto
Publication date
2020/5/18
Conference
2020 IEEE Symposium on Security and Privacy (SP)
Pages
1416-1432
Publisher
IEEE
Description
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments (TEEs) built with Arm TrustZone for the protection of security-critical applications (e.g., DRM) and operating system (OS) components (e.g., Android keystore). TEEs are often assumed to be highly secure; however, over the past years, TEEs have been successfully attacked multiple times, with highly damaging impact across various platforms. Unfortunately, these attacks have been possible by the presence of security flaws in TEE systems. In this paper, we aim to understand which types of vulnerabilities and limitations affect existing TrustZone-assisted TEE systems, what are the main challenges to build them correctly, and what contributions can be borrowed from the research community to overcome them. To this end, we present a security analysis of popular TrustZone-assisted TEE systems (targeting Cortex-A processors …
Total citations
20192020202120222023202422957555834
Scholar articles
D Cerdeira, N Santos, P Fonseca, S Pinto - 2020 IEEE Symposium on Security and Privacy (SP), 2020