CaSE: Cache-Assisted Secure Execution on ARM Processors

被引:60
作者
Zhang, Ning [1 ]
Sun, Kun [2 ]
Lou, Wenjing [1 ]
Hou, Y. Thomas [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA
[2] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23185 USA
来源
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2016年
关键词
TrustZone; Cache; Memory Encryption; PERFORMANCE; ENCRYPTION;
D O I
10.1109/SP.2016.13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recognizing the pressing demands to secure embedded applications, ARM TrustZone has been adopted in both academic research and commercial products to protect sensitive code and data in a privileged, isolated execution environment. However, the design of TrustZone cannot prevent physical memory disclosure attacks such as cold boot attack from gaining unrestricted read access to the sensitive contents in the dynamic random access memory (DRAM). A number of system-on-chip (SoC) bound execution solutions have been proposed to thaw the cold boot attack by storing sensitive data only in CPU registers, CPU cache or internal RAM. However, when the operating system, which is responsible for creating and maintaining the SoC-bound execution environment, is compromised, all the sensitive data is leaked. In this paper, we present the design and development of a cache-assisted secure execution framework, called CaSE, on ARM processors to defend against sophisticated attackers who can launch multi-vector attacks including software attacks and hardware memory disclosure attacks. CaSE utilizes TrustZone and Cache-as-RAM technique to create a cache-based isolated execution environment, which can protect both code and data of security-sensitive applications against the compromised OS and the cold boot attack. To protect the sensitive code and data against cold boot attack, applications are encrypted in memory and decrypted only within the processor for execution. The memory separation and the cache separation provided by TrustZone are used to protect the cached applications against compromised OS. We implement a prototype of CaSE on the i.MX53 running ARM Cortex-A8 processor. The experimental results show that CaSE incurs small impacts on system performance when executing cryptographic algorithms including AES, RSA, and SHA1.
引用
收藏
页码:72 / 90
页数:19
相关论文
共 70 条
[1]  
Advanced Micro Devices Inc, 2013, BIOS KERN DEV GUID B
[2]  
Anati I., 2013, P INT WORKSH HARDW A, P10
[3]  
[Anonymous], 2013, INT C APPL CRYPT NET
[4]  
[Anonymous], 2013, ACM Conference on Computer and Communications Security CCS
[5]  
[Anonymous], 2012, ARM CORTEX A9 PROCES
[6]  
[Anonymous], 2013, ARM CORTEX A15 MPCOR
[7]  
[Anonymous], P NETW DISTR SYST SE
[8]  
[Anonymous], 2014, ARM STRATEGIC REPORT
[9]  
[Anonymous], 2011, ARM Architecture Reference Manual
[10]  
[Anonymous], 2013, P ACSAC 2013 NEW ORL