Attacking TrustZone on devices lacking memory protection

Autor: Stajnrod, Ron, Ben Yehuda, Raz, Zaidenberg, Nezer Jacob
Zdroj: Journal of Computer Virology and Hacking Techniques; September 2022, Vol. 18 Issue: 3 p259-269, 11p
Abstrakt: ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.
Databáze: Supplemental Index