Comparison of side-channel leakage on Rich and Trusted Execution Environments

被引:0
作者
Leignac, Paul [1 ]
Potin, Olivier [1 ]
Rigaud, Jean-Baptiste [1 ]
Dutertre, Jean-Max [1 ]
Pontie, Simon [2 ]
机构
[1] CEA Tech, Ctr CMP, Dept SAS, Mines St Etienne, Gardanne, France
[2] CEA Tech, Ctr CMP, Equipe Commune, Mines St Etienne, Gardanne, France
来源
PROCEEDINGS OF THE SIXTH WORKSHOP ON CRYPTOGRAPHY AND SECURITY IN COMPUTING SYSTEMS CS2 2019 | 2016年
关键词
Trusted Execution Environment; ARM TrustZone; Side-Channel; TVLA; Security; Evaluation; Electromagnetic; CEMA;
D O I
10.1145/3304080.3304084
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A Trusted Execution Environment (TEE) is a software solution made to improve security inside system on chip (SoC) based on ARM architecture. It offers a compromise between the functionality of the Rich Operating System (Rich OS), for example Android, and the security of a Secure Element (SE). ARM TrustZone separates the SoC between two worlds (Normal World and Secure World). The Trusted OS (the OS on the TEE) has several security mechanisms that isolate and secure its execution and data from the Rich OS and save it from data theft. If these mechanisms are made to prevent software attack from Rich OS, this paper proposes to take a look at the identification of data leakage from a TEE facing physical attack. In particular, how a side-channel analysis on electromagnetic (EM) emissions using the Test Vector Leakage Assessment (TVLA) methodology permits to identify the leakage and a correlation electromagnetic analysis (CEMA) can exploit the results.
引用
收藏
页码:19 / 22
页数:4
相关论文
共 19 条
[1]  
Aboulkassimi Driss, 2011, IEEE INT WORKSH INF
[2]  
[Anonymous], 2015, EXPLORING QUALCOMMS
[3]  
[Anonymous], 2013, P 2013 ACM SIGSAC C
[4]  
[Anonymous], 2001, PUB FIPS
[5]  
ARM, 2009, ARM SECURITY TECHNOL
[6]  
Becker G, 2013, INT C MATH COMP
[7]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[8]  
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[9]   ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels [J].
Genkin, Daniel ;
Pachmanov, Lev ;
Pipman, Itamar ;
Tromer, Eran ;
Yarom, Yuval .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1626-1638
[10]  
Global Platform Device Technology, 2013, TEE INT COR API SPEC