Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense.

DAC(2023)

引用 2|浏览15
暂无评分
摘要
ARM Cortex-M is one of the most popular microcontroller architectures designed for embedded and Internet of Things (IoT) applications. To facilitate efficient execution, it has some unique hardware optimization. In particular, Cortex-M TrustZone has a fast state switch mechanism that allows direct control-flow transfer from the secure state program to the non-secure state userspace program. In this paper, we demonstrate how this fast state switch mechanism can be exploited for arbitrary code execution with escalated privilege in the non-secure state by introducing a new exploitation technique, namely return-to-non-secure (ret2ns). We experimentally confirmed the feasibility of four variants of ret2ns attacks on two Cortex-M hardware systems. To defend against ret2ns attacks, we design two address sanitizing mechanisms that have negligible performance overhead.
更多
查看译文
关键词
arbitrary code execution,ARM cortex-M trustzone,Cortex-M hardware systems,direct control-flow transfer,embedded Internet of Things applications,fast state switch mechanism,hardware optimization,microcontroller architectures,nonsecure state userspace program,ret2ns attacks,return-to-nonsecure vulnerabilities,secure state program
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要