3.8 Proceedings Paper

On Runtime Software Security of TrustZone-M Based IoT Devices

Publisher

IEEE
DOI: 10.1109/GLOBECOM42002.2020.9322370

Keywords

Internet of Things; microcontroller; TrustZone; software security

Funding

  1. National Key R&D Program of China [2018YFB2100300, 2018YFB0803400, 2017YFB1003000]
  2. US National Science Foundation (NSF) [1931871, 1915780]
  3. US Department of Energy (DOE) Award [DE-EE0009152]
  4. National Natural Science Foundation of China [U1736203, 61877029, 61972088, 61532013]
  5. Jiangsu Provincial Natural Science Foundation for Excellent Young Scholars [BK20190060]
  6. Direct For Education and Human Resources
  7. Division Of Graduate Education [1915780] Funding Source: National Science Foundation
  8. Direct For Social, Behav & Economic Scie
  9. Divn Of Social and Economic Sciences [1931871] Funding Source: National Science Foundation

Ask authors/readers for more resources

Internet of Things (IoT) devices have been increasingly integrated into our daily life. However, such smart devices suffer a broad attack surface. Particularly, attacks targeting the device software at runtime are challenging to defend against if IoT devices use resource-constrained microcontrollers (MCUs). TrustZone-M, a TrustZone extension for MCUs, is an emerging security technique fortifying MCU based IoT devices. This paper presents the first security analysis of potential software security issues in TrustZone-M enabled MCUs. We explore the stack-based buffer overflow (BOF) attack for code injection, return-oriented programming (ROP) attack, heap-based BOF attack, format string attack, and attacks against Non-secure Callable (NSC) functions in the context of TrustZone-M. We validate these attacks using the Microchip SAM 1.11 M(7113, which uses the ARM Cortex-M23 processor with the TrustZone-M technology. Strategies to mitigate these software attacks are also discussed.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available