Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM Platform 1Institute
for Cyber Security,
University of Texas at San Antonio, San Antonio TX 78249, USA 2Roosevelt
University, Chicago IL 60605,
USA Abstract Security concerns on ARM platform have been
developing in recent years, with some security design and implementations
being introduced on ARM platform. As ARM structure is developing into ARMv8
version, some security research and design had been applied into recent
chips. For example, TrustZone applies to security
concerns of users with ARM Cortex-A and Cortex-M series chips, providing
secure and private enclaves. However, the security design on ARM is severely
challenged by different type of attackers. Side-channel attack is one of the
major threats to ARM platform with TrustZone. In
this paper, we have discussions on the performance and overhead of TrustZone and cache-related instructions, and some stats
of side-channel attack. Our experimental and theoretical evaluations can help
in design of defense framework based on ARM TrustZone,
and provide evidence of how efficient FLUSH operations can work in defense against
cache threats. Keywords: ARM TrustZone,
System Security, Side-Channel Attack +: Co-corresponding author: Naiwei Liu *: Co-Corresponding author: Meng Yu Journal of Wireless Mobile Networks, Ubiquitous
Computing, and Dependable Applications (JoWUA),
Vol. 11, No. 4, pp. 1-15, December 2020 [pdf] DOI: 10.22667/JOWUA.2020.12.31.001 |