Главная
Study mode:
on
1
Intro
2
Lots of Scattered TEE Vulnerability Reports
3
Contributions
4
Source of Vulnerability Information
5
TEE Vulnerabilities Are Severe
6
All Software Layers Have Been Affected
7
TEE Architecture
8
Architecture Issues
9
1.1. Wide Interfaces In TEE Components
10
1.2. Excessively Large TEE TCBS
11
1.3. Map Normal-World Physical Memory
12
1.4. Lackluster Memory Protection
13
1.5. III-Supported TA revocation
14
Three Classes of Vulnerabilities
15
Implementation Issues
16
Validation Bugs
17
2.1. Bugs Within the Secure Monitor
18
Functional Bugs
19
2.2. Bugs in Memory Protection
20
Extrinsic Bugs
21
2.5. Concurrency
22
TEE Hardware
23
Hardware Issues
24
3.2. Energy Management Mechanisms
25
3.3. Leaking Information through Caches
26
How Attackers Attack TEES
27
TEE Defenses
28
Architectural Defenses
29
Implementation Defenses
30
Hardware Defenses
31
In Conclusion
Description:
Explore a comprehensive security analysis of TrustZone-assisted Trusted Execution Environment (TEE) systems in this IEEE conference talk. Delve into the prevailing security vulnerabilities affecting TEE systems developed by major companies like Qualcomm, Trustonic, Huawei, Nvidia, and Linaro. Examine the types of vulnerabilities, challenges in building secure TEE systems, and potential solutions from the research community. Gain insights into the architecture issues, implementation flaws, and hardware vulnerabilities that compromise TEE security. Learn about the severity of TEE vulnerabilities, their impact across software layers, and the various attack vectors used by malicious actors. Discover architectural, implementation, and hardware defenses proposed to enhance TEE security. Understand the implications of these vulnerabilities for the hundreds of millions of mobile devices relying on TrustZone for protecting security-critical applications and operating system components.

Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems

IEEE
Add to list
0:00 / 0:00