Downloads provided by UsageCounts
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. Although TEEs have been promoted as the starting point for establishing a device root of trust, a number of published attacks against the most broadly utilized TEE implementations request a second view on their security. The aim of this research is to provide an analytical and educational exploration of TrustZone-based TEE vulnerabilities with the goal of pinpointing design and implementation flaws. To this end, we provide a taxonomy of TrustZone attacks, analyze them, and more importantly derive a set of critical observations regarding their nature. We perform a critical appraisal of the vulnerabilities to shed light on their underlying causes and we deduce that their manifestation is the joint effect of several parameters that lead to this situation. The most important ones are the closed implementations, the lack of security mechanisms, the shared resource architecture, and the absence of tools to audit trusted applications. Finally, given the severity of the identified issues, we propose possible improvements that could be adopted by TEE implementers to remedy and improve the security posture of TrustZone and future research directions.
IoT, vulnerabilities, Trusted Execution Environments, Chemical technology, TrustZone, TP1-1185, Biochemistry, Atomic and Molecular Physics, and Optics, Article, Analytical Chemistry, side channel attacks, Electrical and Electronic Engineering, exploitation, MAG: 2019-20 coronavirus outbreak, MAG: Computer science, MAG: Vulnerability, MAG: Audit, MAG: Computer security, MAG: Shared resource, MAG: Critical appraisal, MAG: Side channel attack, MAG: Architecture, MAG: Implementation
IoT, vulnerabilities, Trusted Execution Environments, Chemical technology, TrustZone, TP1-1185, Biochemistry, Atomic and Molecular Physics, and Optics, Article, Analytical Chemistry, side channel attacks, Electrical and Electronic Engineering, exploitation, MAG: 2019-20 coronavirus outbreak, MAG: Computer science, MAG: Vulnerability, MAG: Audit, MAG: Computer security, MAG: Shared resource, MAG: Critical appraisal, MAG: Side channel attack, MAG: Architecture, MAG: Implementation
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 22 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
| views | 12 | |
| downloads | 11 |

Views provided by UsageCounts
Downloads provided by UsageCounts