case cache assisted secure execu3on on arm processors
play

CaSE: Cache-Assisted Secure Execu3on on ARM Processors N1NG N1NG - PowerPoint PPT Presentation

CaSE: Cache-Assisted Secure Execu3on on ARM Processors N1NG N1NG ZHANG ZHANG , KUN SUN, WENJING LOU, TOM HOU Who am I ? - 10 years, working on different security products data forensic, mul;-level security systems - did my undergrad @


  1. CaSE: Cache-Assisted Secure Execu3on on ARM Processors N1NG N1NG ZHANG ZHANG , KUN SUN, WENJING LOU, TOM HOU

  2. Who am I ? - 10 years, working on different security products – data forensic, mul;-level security systems - did my undergrad @ Umass – middle of no where - did my Ph.D @ VT in DC. – nice area, but I never got to go out ! - back to industry doing interes;ng things – or not - lastly, I am also an adjunct assistant professor at the complex network and security research laboratory (CNSR) at Virginia Tech

  3. Talk Outline ü Mo;va;on and Background – Why this work ? ü Threat Model – What are we defending against ? ü CaSE: Cache-Assisted Secure Execu;on – How does it work? ü CaSE highlight – Challenges ? ü Evalua;on – How did we do ? ü Conclusion and future Work

  4. Cyber ALacks

  5. Threat to Mobile devices

  6. But how does it really work ?

  7. Buffer overflow - What is a soRware stack

  8. SoRware Exploits – Can you spot the bug ?

  9. What happened ? Tests array

  10. Before and ARer J

  11. So are we doomed ? The best you can do ?

  12. ARM TrustZone – Trusted Execu3on Environment (TEE) System Wide Protec;on Secure World Normal World ü Divides system resources into two worlds ü Normal World runs the content rich OS ü Secure World runs security cri;cal services ü The protec;on of resources includes - processor, memory and IO devices

  13. Many Products use ARM TrustZone

  14. Smart Devices Going Mo Mobile bile

  15. Physical Level ALack

  16. Hardware ALacks - Cold Boot ALack

  17. What can you recover ?

  18. And whatever else that are in memory

  19. Previous Works on Coldboot Defense TRESOR Sec 2011 – Register-based RAM-less AES encryp;on Copker NDSS 2014 – Cache-based RAM-less RSA encryp;on PixelVault CCS 2014 – GPU based RAM-less encryp;on Sentry ASPLOS 2015 – Cache-based RAM-less encryp;on Mimosa S&P 2015 – Transac;onal-based RAM-less encryp;on

  20. Mul3-vector Adversary

  21. Introducing CaSE - Goals ü Defense against Mul;-Vector adversary ü Physical memory disclosure a_ack – Cold boot ü Compromised rich OS ü Provide confiden;ality and integrity to both the code and data of the binaries in TEE ü Confiden;ality – Protects IP, secret code, sensi;ve data ü Integrity – Program behavior

  22. Threat Model System On Chip (SoC) Processor Cache NonSecure Secure Cache Cache NonSecure Normal World Memory Secure Memory DRAM NonSecure Rich OS Secure OS

  23. Case-Assisted Execu3on in Secure World System On Chip (SoC) Processor Cache 0101010110101101 1001 1101 Context Secure storage Packer 1101 0101 0101010110101101 NonSecure Normal World Memory Secure Memory DRAM Secure OS NonSecure Rich OS

  24. Case-Assisted Execu3on in Normal World System On Chip (SoC) Processor Cache 0101010110101101 0101010110101101011010100 1001 0101 1101 1101 CaSE Context Secure Manager storage Packer 1101 0101 0101 1101 0101010110101101 0101010110101101011010100 Secure Memory NonSecure Normal World Memory DRAM NonSecure OS Secure Rich OS

  25. Cache Architecture Details

  26. Controlling the Cache ü Cache Locking is available through L2 cache lockdown CP15 coprocessor ü The granularity of locking is per cache way ü On Cortex-A8, which has 8 way total 256KB L2 unified cache

  27. SoC-Bound Execu3on – Cache Locking

  28. Self Modifying Program System On Chip (SoC) L1 Instruc;on Cache L1 Data Cache L2 Unified Cache

  29. Self Modifying Program System On Chip (SoC) L1 Instruc;on Cache L1 Data Cache L2 Unified Cache

  30. Evalua3on Feasibility of using Cache as Memory

  31. Evalua3on Performance Impact to the Applica3on

  32. Performance Impact to the System

  33. Conclusion ü A secure cache-assisted SoC-bound execu;on framework ü Provide confiden;ality and integrity to sensi;ve code and data of applica;ons ü Protect against both sodware a_acks and cold boot a_ack. ü In the future, we would like to further study efficient method to provide OS support to the TEE.

  34. What other things did I do ? - Differen;al privacy in data mining - ICC 11 - Reverse engineer ASUS BIOS - Trusted Cloud Compu;ng – CNS 14 - An;-memory forensic framework – HIVES – ASIACCS 15 - Cache-based rootkits – EUROSP 16 - Case – Cached-assisted security execu;on – SP16 - Augmented reality authen;ca;on – TRUSTED – CCS16 Feel free to contact me at Ningzhang.info / ningzh@vt.edu

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend