How trustzone could be bypassed: Side-channel attacks on a modern system-on-chip

6Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Side-channel attacks (SCA) exploit the reification of a computation through its physical dimensions (current consumption, EM emission,..). Focusing on Electromagnetic analyses (EMA), such analyses have mostly been considered on low-end devices: smartcards and microcontrollers. In the wake of recent works, we propose to analyze the effects of a modern microarchitecture on the efficiency of EMA (here Correlation Power Analysis and template attacks). We show that despite the difficulty to synchronize the measurements, the speed of the targeted core and the activity of other cores on the same chip can still be accommodated. Finally, we confirm that enabling the secure mode of TrustZone (a hardware-assisted software countermeasure) has no effect whatsoever on the EMA efficiency. Therefore, critical applications in TrustZone are not more secure than in the normal world with respect to EMA, in accordance with the fact that it is not a countermeasure against physical attacks. For the best of our knowledge this is the first application of EMA against TrustZone.

Cite

CITATION STYLE

APA

Bukasa, S. K., Lashermes, R., Le Bouder, H., Lanet, J. L., & Legay, A. (2018). How trustzone could be bypassed: Side-channel attacks on a modern system-on-chip. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10741 LNCS, pp. 93–109). Springer Verlag. https://doi.org/10.1007/978-3-319-93524-9_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free