RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone

被引:0
作者
Wang, Jinwen [1 ]
Li, Ao [1 ]
Li, Haoran [1 ]
Lu, Chenyang [1 ]
Zhang, Ning [1 ]
机构
[1] Washington Univ, St Louis, MO 63110 USA
来源
43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022) | 2022年
基金
美国国家科学基金会;
关键词
D O I
10.1109/SP46214.2022.00144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded devices are becoming increasingly pervasive in safety-critical systems of the emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM TrustZone, have been widely deployed in mobile platforms, little attention has been given to deployment on real-time cyberphysical systems, which present a different set of challenges compared to mobile applications. For safety-critical cyber-physical systems, such as autonomous drones or automobiles, the current TEE deployment paradigm, which focuses only on confidentiality and integrity, is insufficient. Computation in these systems also needs to be completed in a timely manner (e.g., before the car hits a pedestrian), putting a much stronger emphasis on availability. To bridge this gap, we present RT-TEE, a real-time trusted execution environment. There are three key research challenges. First, RT-TEE bootstraps the ability to ensure availability using a minimal set of hardware primitives on commodity embedded platforms. Second, to balance real-time performance and scheduler complexity, we designed a policy-based event-driven hierarchical scheduler. Third, to mitigate the risks of having device drivers in the secure environment, we designed an I/O reference monitor that leverages software sandboxing and driver debloating to provide fine-grained access control on peripherals while minimizing the trusted computing base (TCB). We implemented prototypes on both ARMv8-A and ARMv8-M platforms. The system is tested on both synthetic tasks and reallife CPS applications. We evaluated rover and plane in simulation and quadcopter both in simulation and with a real drone.
引用
收藏
页码:352 / 369
页数:18
相关论文
共 83 条
  • [1] Challenges in Designing Exploit Mitigations for Deeply Embedded Systems
    Abbasi, Ali
    Wetzels, Jos
    Holz, Thorsten
    Etalle, Sandro
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 31 - 46
  • [2] C-FLAT: Control-Flow Attestation for Embedded Systems Software
    Abera, Tigist
    Asokan, N.
    Davi, Lucas
    Ekberg, Jan-Erik
    Nyman, Thomas
    Paverd, Andrew
    Sadeghi, Ahmad-Reza
    Tsudik, Gene
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 743 - 754
  • [3] Alder F., 2021, CCS
  • [4] Almakhdhub N. S., 2020, NDSS
  • [5] [Anonymous], BUSYBOX CVE 2017 165
  • [6] [Anonymous], HACKERS REMOTELY KIL
  • [7] [Anonymous], QUALCOMM TEE
  • [8] [Anonymous], FTP SYSTEM FILE ACCE
  • [9] [Anonymous], ARM CPU
  • [10] [Anonymous], Open Portable Trusted Execution Environment