What the TrustZone-M Doesn't See, the MCU Does Grieve Over: Lessons Learned

  Рет қаралды 675

Black Hat

Black Hat

Күн бұрын

What the TrustZone-M Doesn't See, the MCU Does Grieve Over: Lessons Learned from Assessing a Microcontroller TEE
Arm Cortex-M Microcontrollers (MCUs) are the de facto computing units powering billions of small embedded and Internet of Things (IoT) devices. Recently, as a step towards securing devices at scale, Arm introduced the TrustZone technology in the latest generation of their Armv8-M MCUs (e.g., Cortex-M33). TrustZone-M partitions the CPU into two worlds, enabling the materialization of Trusted Execution Environments (TEEs) on constrained devices. One of the weakest aspects of TrustZone-M is the CPU-centric view, i.e., the specification only defines CPU-level security protection controllers (e.g., SAU, IDAU). Still, MCUs have a number of other peripherals and computing elements (e.g., DMA devices) at the system level, and achieving system-wide isolation requires vendor-specific platform protection controllers (PPCs). We argue that this dichotomy, together with a lack of understanding of the PSA isolation levels, can be a major catalyst for the existence of unknown security holes in modern TrustZone-M systems, and we found evidence that supports our claim.
In this talk, we share our journey on fully assessing an MCU-based TEE targeting a reference TrustZone-M hardware platform. First, we clarify the PSA isolation levels and describe the limitations of the target hardware platform for providing isolation within the secure world. Then, we discuss the assessed TEE system, explain how it is possible to bypass CPU-level isolation primitives, and explain the design of a TEE core mechanism to offer such protection. To close the talk, we perform a live demo of one potential exploit demonstrating how a Secure Partition (controlled by an untrusted application) can bypass all hardware and software TEE isolation boundaries to retrieve a cryptographic key from other Secure Partitions or the Trusted kernel.
By:
Sandro Pinto | Associate Research Professor, Universidade do Minho
Cristiano Rodrigues | PhD Student, Universidade do Minho
Full Abstract & Presentation Materials:
www.blackhat.c...

Пікірлер
Privacy Detective: Sniffing Out Your Data Leaks for Android
30:04
МЕНЯ УКУСИЛ ПАУК #shorts
00:23
Паша Осадчий
Рет қаралды 2,2 МЛН
Wait for it 😂
00:19
ILYA BORZOV
Рет қаралды 11 МЛН
Каха и лужа  #непосредственнокаха
00:15
Fireside Chat: Jeff Moss and Ruimin He
53:03
Black Hat
Рет қаралды 455
36C3 -  TrustZone-M(eh): Breaking ARMv8-M's security
57:22
media.ccc.de
Рет қаралды 13 М.
The AI Cybersecurity future is here
26:42
David Bombal
Рет қаралды 163 М.
eBPF: Unlocking the Kernel [OFFICIAL DOCUMENTARY]
30:00
Speakeasy Productions
Рет қаралды 103 М.
Introduction to ARM: Cortex M CPUs | Embedded Systems podcast, in Pyjama!
42:19
Embedded Systems, in Pyjama!
Рет қаралды 9 М.
МЕНЯ УКУСИЛ ПАУК #shorts
00:23
Паша Осадчий
Рет қаралды 2,2 МЛН