DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2018

DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC

Résumé

Today, most embedded systems use Dynamic Voltage and Frequency Scaling (DVFS) to minimize energy consumption and maximize performance. The DVFS technique works by regulating the important parameters that govern the amount of energy consumed in a system, voltage and frequency. For the implementation of this technique, the operating system (OS) includes software applications that dynamically control a voltage regulator or a frequency regulator or both. In this paper, we demonstrate for the first time a malicious use of the frequency regulator against a TrustZone-enabled System-on-Chip (SoC). We use frequency scaling to create a covert channel in a TrustZone-enabled heterogeneous SoC. We present three different attacks, the first is discreet transmission of sensitive data from the SoC to outside, using electromagnetic emission. The second attack is the inside-SoC transfer of valuable data from a secure ARM core to a non-secure one. The last attack is the inside-SoC transfer of data between a non-trusted third party IP embedded in the programmable logic part of the SoC and a processor core.
Fichier principal
Vignette du fichier
Benhanni_ICECS_2018.pdf (347.29 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-02044896 , version 1 (21-02-2019)

Identifiants

Citer

El Mehdi Benhani, Lilian Bossuet. DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC. 25th IEEE International Conference on Electronics Circuits and Systems, Dec 2018, Bordeaux, France. ⟨hal-02044896⟩
56 Consultations
122 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More