VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone

Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:GetMobile (New York, N.Y.) N.Y.), 2020-09, Vol.24 (2), p.30-33
Hauptverfasser: Qui, Pengfei, Wang, Dongsheng, Lyu, Yongqiang, Qu, Gang
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 33
container_issue 2
container_start_page 30
container_title GetMobile (New York, N.Y.)
container_volume 24
creator Qui, Pengfei
Wang, Dongsheng
Lyu, Yongqiang
Qu, Gang
description Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this article, we propose an innovative software-controlled hardware fault-based attack, VoltJockey, on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency. We deliberately manipulate the processor voltage via DVFS to induce hardware faults into the victim cores, and therefore breaking TrustZone. The entire attack process is based on software without any involvement of hardware, which makes VoltJockey stealthy and hard to prevent.
doi_str_mv 10.1145/3427384.3427394
format Article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3427384_3427394</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1145_3427384_3427394</sourcerecordid><originalsourceid>FETCH-LOGICAL-c125t-7c6c67829ee97a54a37590cf07cbb8bdb8523f28f25e63948769aa54a67eadcc3</originalsourceid><addsrcrecordid>eNo9jzkLAjEUhIMoeNb-itXcLylFPFmwUduQfSbgxcrGxn_vqovFMFMMw3yEjBmdMCbVVEgOwsjJ161skR4XoDKqBLT_mdsuGaV0oZQyxVitHukfy9tzW-I1vIakE_0thVHjA3JYLvbzdZbvVpv5LM-QcfXMADVqMNyGYMEr6etxSzFSwKIwxakwiovITeQq6PqLAW39p6ch-BOiGJDpbxerMqUqRPeozndfvRyj7kPjGhrX0Ig3M646Jg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone</title><source>ACM Digital Library Complete</source><creator>Qui, Pengfei ; Wang, Dongsheng ; Lyu, Yongqiang ; Qu, Gang</creator><creatorcontrib>Qui, Pengfei ; Wang, Dongsheng ; Lyu, Yongqiang ; Qu, Gang</creatorcontrib><description>Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this article, we propose an innovative software-controlled hardware fault-based attack, VoltJockey, on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency. We deliberately manipulate the processor voltage via DVFS to induce hardware faults into the victim cores, and therefore breaking TrustZone. The entire attack process is based on software without any involvement of hardware, which makes VoltJockey stealthy and hard to prevent.</description><identifier>ISSN: 2375-0529</identifier><identifier>EISSN: 2375-0537</identifier><identifier>DOI: 10.1145/3427384.3427394</identifier><language>eng</language><ispartof>GetMobile (New York, N.Y.), 2020-09, Vol.24 (2), p.30-33</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c125t-7c6c67829ee97a54a37590cf07cbb8bdb8523f28f25e63948769aa54a67eadcc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,27906,27907</link.rule.ids></links><search><creatorcontrib>Qui, Pengfei</creatorcontrib><creatorcontrib>Wang, Dongsheng</creatorcontrib><creatorcontrib>Lyu, Yongqiang</creatorcontrib><creatorcontrib>Qu, Gang</creatorcontrib><title>VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone</title><title>GetMobile (New York, N.Y.)</title><description>Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this article, we propose an innovative software-controlled hardware fault-based attack, VoltJockey, on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency. We deliberately manipulate the processor voltage via DVFS to induce hardware faults into the victim cores, and therefore breaking TrustZone. The entire attack process is based on software without any involvement of hardware, which makes VoltJockey stealthy and hard to prevent.</description><issn>2375-0529</issn><issn>2375-0537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNo9jzkLAjEUhIMoeNb-itXcLylFPFmwUduQfSbgxcrGxn_vqovFMFMMw3yEjBmdMCbVVEgOwsjJ161skR4XoDKqBLT_mdsuGaV0oZQyxVitHukfy9tzW-I1vIakE_0thVHjA3JYLvbzdZbvVpv5LM-QcfXMADVqMNyGYMEr6etxSzFSwKIwxakwiovITeQq6PqLAW39p6ch-BOiGJDpbxerMqUqRPeozndfvRyj7kPjGhrX0Ig3M646Jg</recordid><startdate>20200929</startdate><enddate>20200929</enddate><creator>Qui, Pengfei</creator><creator>Wang, Dongsheng</creator><creator>Lyu, Yongqiang</creator><creator>Qu, Gang</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20200929</creationdate><title>VoltJockey</title><author>Qui, Pengfei ; Wang, Dongsheng ; Lyu, Yongqiang ; Qu, Gang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c125t-7c6c67829ee97a54a37590cf07cbb8bdb8523f28f25e63948769aa54a67eadcc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Qui, Pengfei</creatorcontrib><creatorcontrib>Wang, Dongsheng</creatorcontrib><creatorcontrib>Lyu, Yongqiang</creatorcontrib><creatorcontrib>Qu, Gang</creatorcontrib><collection>CrossRef</collection><jtitle>GetMobile (New York, N.Y.)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Qui, Pengfei</au><au>Wang, Dongsheng</au><au>Lyu, Yongqiang</au><au>Qu, Gang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone</atitle><jtitle>GetMobile (New York, N.Y.)</jtitle><date>2020-09-29</date><risdate>2020</risdate><volume>24</volume><issue>2</issue><spage>30</spage><epage>33</epage><pages>30-33</pages><issn>2375-0529</issn><eissn>2375-0537</eissn><abstract>Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this article, we propose an innovative software-controlled hardware fault-based attack, VoltJockey, on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency. We deliberately manipulate the processor voltage via DVFS to induce hardware faults into the victim cores, and therefore breaking TrustZone. The entire attack process is based on software without any involvement of hardware, which makes VoltJockey stealthy and hard to prevent.</abstract><doi>10.1145/3427384.3427394</doi><tpages>4</tpages></addata></record>
fulltext fulltext
identifier ISSN: 2375-0529
ispartof GetMobile (New York, N.Y.), 2020-09, Vol.24 (2), p.30-33
issn 2375-0529
2375-0537
language eng
recordid cdi_crossref_primary_10_1145_3427384_3427394
source ACM Digital Library Complete
title VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T10%3A57%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=VoltJockey:%20Abusing%20the%20Processor%20Voltage%20to%20Break%20Arm%20TrustZone&rft.jtitle=GetMobile%20(New%20York,%20N.Y.)&rft.au=Qui,%20Pengfei&rft.date=2020-09-29&rft.volume=24&rft.issue=2&rft.spage=30&rft.epage=33&rft.pages=30-33&rft.issn=2375-0529&rft.eissn=2375-0537&rft_id=info:doi/10.1145/3427384.3427394&rft_dat=%3Ccrossref%3E10_1145_3427384_3427394%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true