Please enable JavaScript.
Coggle requires JavaScript to display documents.
ESS (ARM (Features (16 registers, that are all directly accessible (r0 to…
ESS
ARM
Features
-
-
-
-
16 registers, that are all directly accessible (r0 to r15)
-
-
-
-
-
-
-
-
-
-
-
Trusted Computing
Chain of trust
-
Definition
-
-
-
Trusting E2 requires to trust E0 and E1, but trusting E0 does not imply that ones trusts E2
Basics
-
-
Definitions
-
Trusted
System or component whose failure can break the (security) policy (Trusted Computing Base, TCB)
Trustworthy
Degree to which behavior of a component or system is demonstrably compliant with its stated functionality
Goals
-
Reuse existing modules (GUI, common OS,..)
Applicable to different operating systems (no monopoly, room for innovation)
Open architecture (use of open standards + OSS, trustworthiness, costs, reliability, compatibility)
-
-
-
-
Need for secure
-
Software
-
Complete new design (compatibility problems, low market acceptance)
-
-
-
-
Remote Attestation
-
PUF-based Attestation
Security
prover identity is provided by unique PUF (PUF must be hard to copy/simulate, e.g. Controlled-PUF)
Hard to manipulate (No secure co-processor or secure key storage, only PUF, PUF can protect other components)
Limit network interface speed prevents collusion (in each iteration do more I/O between CPU/PUF than could have been transmitted via network)
-
-
-
-
SMART
-
-
protocol steps
-
-
-
Check for valid key access: instruction pointer is in smart code? If false, reset system
-
-
-
-
-
-
-
Attestation Code
-
-
entrance only at first address, exit only at last address (code reuse attack)
-
Disadvantages
-
non-interruptible execution / reset on violation
(limits scope of measured code, limited runtime for measured code in real-time systems)
-
TrustLite
-
-
Trustlet loading
-
-
-
Further Trustlets are loaded and protected
(Meta data saved in Trustlet Table, mapped into memory)
-
-
-
Attestation trustlet
-
Attestation trustlet calculates HASH over code region, the nonce and the key (only accessible by the Attest TL)
-
Advantages
Flexible (interruptible, protection region freely configurable)
-
-
-
-
-
-
-
Rowhammer
-
-
Attacks
Double-Sided Rowhammer
Attacking one row, by using upper and lower row as aggressor (more bit flips)
-
-
-
Defenses
-
-
-
ANVIL
-
-
Disadvantage:
Heuristic-based approach, suffers from false positives
-
-
-
-
-
-
Mobile Hardware Platform Security Example
-
Example: FitnessTracker
Message Flow
-
Download settings:
Pairing instructions & User, Device info
-
-
-
-
-
-