Title
Breaking TrustZone Memory Isolation through Malicious Hardware on a Modern FPGA-SoC
Abstract
FPGA-SoCs are heterogeneous computing systems consisting of reconfigurable hardware and high performance processing units. This combination enables a flexible design methodology for embedded systems. However, the sharing of resources between these heterogeneous systems opens the door to attacks from one system on the other. This work considers Direct Memory Access attacks from a malicious hardware block inside the reconfigurable logic on the CPU. Previous works have shown similar attacks on FPGA-SoCs containing no memory isolation between the FPGA and the CPU. Our work studies the same idea on a system based on the Xilinx Zynq Ultrascale+ architecture. This platform contains memory isolation mechanisms such as a system memory management unit, memory protection units and supports ARM TrustZone technology. Despite the existence of these protection mechanisms, the two attacks presented in this work show that a malicious hardware block can still interfere with a security critical task executed on the CPU inside ARM TrustZone
Year
DOI
Venue
2019
10.1145/3338508.3359568
Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop
Keywords
DocType
ISBN
dma attack, fpga-socs, hardware trojan, memory isolation, trusted execution environment, trustzone
Conference
978-1-4503-6839-1
Citations 
PageRank 
References 
0
0.34
0
Authors
4
Name
Order
Citations
PageRank
Mathieu Gross131.78
Nisha Jacob200.34
Andreas Zankl3647.78
Georg Sigl444762.13