VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone
Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this...
Gespeichert in:
Veröffentlicht in: | GetMobile (New York, N.Y.) N.Y.), 2020-09, Vol.24 (2), p.30-33 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 33 |
---|---|
container_issue | 2 |
container_start_page | 30 |
container_title | GetMobile (New York, N.Y.) |
container_volume | 24 |
creator | Qui, Pengfei Wang, Dongsheng Lyu, Yongqiang Qu, Gang |
description | Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this article, we propose an innovative software-controlled hardware fault-based attack, VoltJockey, on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency. We deliberately manipulate the processor voltage via DVFS to induce hardware faults into the victim cores, and therefore breaking TrustZone. The entire attack process is based on software without any involvement of hardware, which makes VoltJockey stealthy and hard to prevent. |
doi_str_mv | 10.1145/3427384.3427394 |
format | Article |
fullrecord | <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3427384_3427394</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1145_3427384_3427394</sourcerecordid><originalsourceid>FETCH-LOGICAL-c125t-7c6c67829ee97a54a37590cf07cbb8bdb8523f28f25e63948769aa54a67eadcc3</originalsourceid><addsrcrecordid>eNo9jzkLAjEUhIMoeNb-itXcLylFPFmwUduQfSbgxcrGxn_vqovFMFMMw3yEjBmdMCbVVEgOwsjJ161skR4XoDKqBLT_mdsuGaV0oZQyxVitHukfy9tzW-I1vIakE_0thVHjA3JYLvbzdZbvVpv5LM-QcfXMADVqMNyGYMEr6etxSzFSwKIwxakwiovITeQq6PqLAW39p6ch-BOiGJDpbxerMqUqRPeozndfvRyj7kPjGhrX0Ig3M646Jg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone</title><source>ACM Digital Library Complete</source><creator>Qui, Pengfei ; Wang, Dongsheng ; Lyu, Yongqiang ; Qu, Gang</creator><creatorcontrib>Qui, Pengfei ; Wang, Dongsheng ; Lyu, Yongqiang ; Qu, Gang</creatorcontrib><description>Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this article, we propose an innovative software-controlled hardware fault-based attack, VoltJockey, on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency. We deliberately manipulate the processor voltage via DVFS to induce hardware faults into the victim cores, and therefore breaking TrustZone. The entire attack process is based on software without any involvement of hardware, which makes VoltJockey stealthy and hard to prevent.</description><identifier>ISSN: 2375-0529</identifier><identifier>EISSN: 2375-0537</identifier><identifier>DOI: 10.1145/3427384.3427394</identifier><language>eng</language><ispartof>GetMobile (New York, N.Y.), 2020-09, Vol.24 (2), p.30-33</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c125t-7c6c67829ee97a54a37590cf07cbb8bdb8523f28f25e63948769aa54a67eadcc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,27906,27907</link.rule.ids></links><search><creatorcontrib>Qui, Pengfei</creatorcontrib><creatorcontrib>Wang, Dongsheng</creatorcontrib><creatorcontrib>Lyu, Yongqiang</creatorcontrib><creatorcontrib>Qu, Gang</creatorcontrib><title>VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone</title><title>GetMobile (New York, N.Y.)</title><description>Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this article, we propose an innovative software-controlled hardware fault-based attack, VoltJockey, on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency. We deliberately manipulate the processor voltage via DVFS to induce hardware faults into the victim cores, and therefore breaking TrustZone. The entire attack process is based on software without any involvement of hardware, which makes VoltJockey stealthy and hard to prevent.</description><issn>2375-0529</issn><issn>2375-0537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNo9jzkLAjEUhIMoeNb-itXcLylFPFmwUduQfSbgxcrGxn_vqovFMFMMw3yEjBmdMCbVVEgOwsjJ161skR4XoDKqBLT_mdsuGaV0oZQyxVitHukfy9tzW-I1vIakE_0thVHjA3JYLvbzdZbvVpv5LM-QcfXMADVqMNyGYMEr6etxSzFSwKIwxakwiovITeQq6PqLAW39p6ch-BOiGJDpbxerMqUqRPeozndfvRyj7kPjGhrX0Ig3M646Jg</recordid><startdate>20200929</startdate><enddate>20200929</enddate><creator>Qui, Pengfei</creator><creator>Wang, Dongsheng</creator><creator>Lyu, Yongqiang</creator><creator>Qu, Gang</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20200929</creationdate><title>VoltJockey</title><author>Qui, Pengfei ; Wang, Dongsheng ; Lyu, Yongqiang ; Qu, Gang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c125t-7c6c67829ee97a54a37590cf07cbb8bdb8523f28f25e63948769aa54a67eadcc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Qui, Pengfei</creatorcontrib><creatorcontrib>Wang, Dongsheng</creatorcontrib><creatorcontrib>Lyu, Yongqiang</creatorcontrib><creatorcontrib>Qu, Gang</creatorcontrib><collection>CrossRef</collection><jtitle>GetMobile (New York, N.Y.)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Qui, Pengfei</au><au>Wang, Dongsheng</au><au>Lyu, Yongqiang</au><au>Qu, Gang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone</atitle><jtitle>GetMobile (New York, N.Y.)</jtitle><date>2020-09-29</date><risdate>2020</risdate><volume>24</volume><issue>2</issue><spage>30</spage><epage>33</epage><pages>30-33</pages><issn>2375-0529</issn><eissn>2375-0537</eissn><abstract>Based on the concept of hardware separation, ARM introduced TrustZone to build a trusted execution environment for applications. It has been quite successful in defending against various software attacks and forcing attackers to explore vulnerabilities in interface designs and side channels. In this article, we propose an innovative software-controlled hardware fault-based attack, VoltJockey, on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency. We deliberately manipulate the processor voltage via DVFS to induce hardware faults into the victim cores, and therefore breaking TrustZone. The entire attack process is based on software without any involvement of hardware, which makes VoltJockey stealthy and hard to prevent.</abstract><doi>10.1145/3427384.3427394</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2375-0529 |
ispartof | GetMobile (New York, N.Y.), 2020-09, Vol.24 (2), p.30-33 |
issn | 2375-0529 2375-0537 |
language | eng |
recordid | cdi_crossref_primary_10_1145_3427384_3427394 |
source | ACM Digital Library Complete |
title | VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T10%3A57%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=VoltJockey:%20Abusing%20the%20Processor%20Voltage%20to%20Break%20Arm%20TrustZone&rft.jtitle=GetMobile%20(New%20York,%20N.Y.)&rft.au=Qui,%20Pengfei&rft.date=2020-09-29&rft.volume=24&rft.issue=2&rft.spage=30&rft.epage=33&rft.pages=30-33&rft.issn=2375-0529&rft.eissn=2375-0537&rft_id=info:doi/10.1145/3427384.3427394&rft_dat=%3Ccrossref%3E10_1145_3427384_3427394%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |