@BlackHatOfficialYT
  @BlackHatOfficialYT
Black Hat | Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments @BlackHatOfficialYT | Uploaded 4 weeks ago | Updated 35 minutes ago
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems

In the recent past, technologies like Trusted Execution Environments (TEE) have emerged that provide sound security guarantees even against power adversaries exercising control over the privileged untrusted kernel. As such, TEEs have become the centrepiece to implementing critical operations in an embedded systems setting.

In modern IoT settings, physical attacks (like side-channel and fault attacks) are increasingly relevant. However, by physical characteristics (like electromagnetic shields) or software checks (memory encryption), TEEs defend against physical attacks on processors and memory chips. In this research, however, we demonstrate practical attack scenarios on TEEs using a new dimension: SoC system bus. We first unearth the fault characteristics of both aspects of the system bus- data bus and address bus. We then use these bus faults to mount an end-to-end attack on a commercial Trusted Execution Environment (Open Portable Trusted Execution Environment, or OP-TEE) implementation for embedded systems. Additionally, we also demonstrate loopholes in TEE specification (specifically GlobalPlatform API specification) as well as in Linux function return conventions that aid adversarial objectives.

Our research puts forth a vital perspective in the purview of embedded systems: development of (1) API specifications as well as (2) independent software implementations of TEEs for embedded systems need to be revisited keeping in mind an adversary which can fault not only the processor or memory, but also the system bus. Overall, this research reinforces the importance of considering not only the software implementation of abstract specification, but also the execution environment where the implementation is expected to operate.

By:
Nimish Mishra | Research scholar, Indian Institute of Technology Kharagpur
Anirban Chakraborty | Research scholar, Indian Institute of Technology Kharagpur
Debdeep Mukhopadhyay | Institute Chair Professor, Indian Institute of Technology, Kharagpur

Full Abstract & Presentation Materials: blackhat.com/asia-24/briefings/schedule/#faults-in-our-bus-novel-bus-fault-attack-to-break-trusted-execution-environments-in-embedded-systems-38013
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution EnvironmentsSecond Breakfast: Implicit and Mutation-Based Serialization Vulnerabilities in .NETHouston, We Have a Problem: Analyzing the Security of Low Earth Orbit SatellitesBreaking Theoretical Limits: The Gap Between Virtual NICs and Physical Network CardsCloud Console Cartographer: Tapping Into Mapping- Slogging Thru LoggingInternational Threat Actors are Targeting Children to Steal Money from Banks & Major CorporationsChinas Military Cyber Operations: Has the Strategic Support Force Come of Age?Collide+Power: The Evolution of Software-based Power Side-Channels AttacksUncovering Azures Silent Threats: A Journey into Cloud VulnerabilitiesLogoFAIL: Security Implications of Image Parsing During System BootKeynote: Industrialising Cyber Defence in an Asymmetric WorldKnow Thy Enemy: The Taxonomies That Meta Uses to Map the Offensive Privacy Space

Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments @BlackHatOfficialYT

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER