Cargando…

Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone

TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. Although TEEs have been promoted as the starting point for establishing a device root of trust, a number of...

Descripción completa

Detalles Bibliográficos
Autores principales: Koutroumpouchos, Nikolaos, Ntantogian, Christoforos, Xenakis, Christos
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7828402/
https://www.ncbi.nlm.nih.gov/pubmed/33450919
http://dx.doi.org/10.3390/s21020520
_version_ 1783641003990712320
author Koutroumpouchos, Nikolaos
Ntantogian, Christoforos
Xenakis, Christos
author_facet Koutroumpouchos, Nikolaos
Ntantogian, Christoforos
Xenakis, Christos
author_sort Koutroumpouchos, Nikolaos
collection PubMed
description TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. Although TEEs have been promoted as the starting point for establishing a device root of trust, a number of published attacks against the most broadly utilized TEE implementations request a second view on their security. The aim of this research is to provide an analytical and educational exploration of TrustZone-based TEE vulnerabilities with the goal of pinpointing design and implementation flaws. To this end, we provide a taxonomy of TrustZone attacks, analyze them, and more importantly derive a set of critical observations regarding their nature. We perform a critical appraisal of the vulnerabilities to shed light on their underlying causes and we deduce that their manifestation is the joint effect of several parameters that lead to this situation. The most important ones are the closed implementations, the lack of security mechanisms, the shared resource architecture, and the absence of tools to audit trusted applications. Finally, given the severity of the identified issues, we propose possible improvements that could be adopted by TEE implementers to remedy and improve the security posture of TrustZone and future research directions.
format Online
Article
Text
id pubmed-7828402
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-78284022021-01-25 Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone Koutroumpouchos, Nikolaos Ntantogian, Christoforos Xenakis, Christos Sensors (Basel) Article TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. Although TEEs have been promoted as the starting point for establishing a device root of trust, a number of published attacks against the most broadly utilized TEE implementations request a second view on their security. The aim of this research is to provide an analytical and educational exploration of TrustZone-based TEE vulnerabilities with the goal of pinpointing design and implementation flaws. To this end, we provide a taxonomy of TrustZone attacks, analyze them, and more importantly derive a set of critical observations regarding their nature. We perform a critical appraisal of the vulnerabilities to shed light on their underlying causes and we deduce that their manifestation is the joint effect of several parameters that lead to this situation. The most important ones are the closed implementations, the lack of security mechanisms, the shared resource architecture, and the absence of tools to audit trusted applications. Finally, given the severity of the identified issues, we propose possible improvements that could be adopted by TEE implementers to remedy and improve the security posture of TrustZone and future research directions. MDPI 2021-01-13 /pmc/articles/PMC7828402/ /pubmed/33450919 http://dx.doi.org/10.3390/s21020520 Text en © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Koutroumpouchos, Nikolaos
Ntantogian, Christoforos
Xenakis, Christos
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
title Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
title_full Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
title_fullStr Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
title_full_unstemmed Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
title_short Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
title_sort building trust for smart connected devices: the challenges and pitfalls of trustzone
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7828402/
https://www.ncbi.nlm.nih.gov/pubmed/33450919
http://dx.doi.org/10.3390/s21020520
work_keys_str_mv AT koutroumpouchosnikolaos buildingtrustforsmartconnecteddevicesthechallengesandpitfallsoftrustzone
AT ntantogianchristoforos buildingtrustforsmartconnecteddevicesthechallengesandpitfallsoftrustzone
AT xenakischristos buildingtrustforsmartconnecteddevicesthechallengesandpitfallsoftrustzone