Title
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World
Abstract
TrustZone-based Real-time Kernel Protection (TZ-RKP) is a novel system that provides real-time protection of the OS kernel using the ARM TrustZone secure world. TZ-RKP is more secure than current approaches that use hypervisors to host kernel protection tools. Although hypervisors provide privilege and isolation, they face fundamental security challenges due to their growing complexity and code size. TZ-RKP puts its security monitor, which represents its entire Trusted Computing Base (TCB), in the TrustZone secure world; a safe isolated environment that is dedicated to security services. Hence, the security monitor is safe from attacks that can potentially compromise the kernel, which runs in the normal world. Using the secure world for kernel protection has been crippled by the lack of control over targets that run in the normal world. TZ-RKP solves this prominent challenge using novel techniques that deprive the normal world from the ability to control certain privileged system functions. These functions are forced to route through the secure world for inspection and approval before being executed. TZ-RKP's control of the normal world is non-bypassable. It can effectively stop attacks that aim at modifying or injecting kernel binaries. It can also stop attacks that involve modifying the system memory layout, e.g, through memory double mapping. This paper presents the implementation and evaluation of TZ-RKP, which has gone through rigorous and thorough evaluation of effectiveness and performance. It is currently deployed on the latest models of the Samsung Galaxy series smart phones and tablets, which clearly demonstrates that it is a practical real-world system.
Year
DOI
Venue
2014
10.1145/2660267.2660350
ACM Conference on Computer and Communications Security
Keywords
Field
DocType
arm trustzone,integrity monitoring,kernel protection,security and protection
Kernel (linear algebra),Code size,Computer science,Computer security,Hypervisor,Os kernel,Trusted computing base,Isolated environment
Conference
Citations 
PageRank 
References 
94
2.63
38
Authors
8
Name
Order
Citations
PageRank
Ahmed M. Azab140016.83
Peng Ning26868386.15
Jitesh Shah3942.63
Quan Chen413114.69
Rohan Bhutkar51073.18
Guruprasad Ganesh6993.09
Jia Ma71074.19
Wenbo Shen81789.87