Comparison of side-channel leakage on Rich and Trusted Execution Environments - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2019

Comparison of side-channel leakage on Rich and Trusted Execution Environments

Résumé

A Trusted Execution Environment (TEE) is a software solution made to improve security inside system on chip (SoC) based on ARM architecture. It offers a compromise between the functionality of the Rich Operating System (Rich OS), for example Android, and the security of a Secure Element (SE). ARM TrustZone separates the SoC between two worlds (Normal World and Secure World). The Trusted OS (the OS on the TEE) has several security mechanisms that isolate and secure its execution and data from the Rich OS and save it from data theft. If these mechanisms are made to prevent software attack from Rich OS, this paper proposes to take a look at the identification of data leakage from a TEE facing physical attack. In particular, how a side-channel analysis on electromagnetic (EM) emissions using the Test Vector Leakage Assessment (TVLA) methodology permits to identify the leakage and a correlation electromagnetic analysis (CEMA) can exploit the results.
Fichier principal
Vignette du fichier
HAL_CS2_2019_Comparison_of_side_channel_leakage_on_Rich_and_Trusted_Execution_Environments.pdf (1.62 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-02380360 , version 1 (26-11-2019)

Identifiants

Citer

Paul Leignac, Olivier Potin, Jean-Baptiste Rigaud, Jean-Max Dutertre, Simon Pontie. Comparison of side-channel leakage on Rich and Trusted Execution Environments. the Sixth Workshop, Jan 2019, Valencia, Spain. pp.19-22, ⟨10.1145/3304080.3304084⟩. ⟨hal-02380360⟩
75 Consultations
244 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More