论文标题
在基于Trustzone-M的IOT设备的运行时软件安全性上
On Runtime Software Security of TrustZone-M based IoT Devices
论文作者
论文摘要
物联网(IoT)设备已越来越多地整合到我们的日常生活中。但是,这种智能设备遭受了广泛的攻击表面。特别是,如果IoT设备使用资源受限的微控制器(MCUS),则针对运行时针对设备软件的攻击要挑战。 Trustzone-M是MCUS的Trustzone扩展,是一种强化基于MCU的IoT设备的新兴安全技术。本文介绍了对Trustzone-M启用MCUS中潜在软件安全问题的首次安全分析。我们探索了基于堆栈的缓冲区溢出(BOF)攻击,以注入代码,以返回为导向的编程(ROP)攻击,基于堆的BOF攻击,格式字符串攻击以及在Trustzone-M中针对非安全可可式(NSC)功能的攻击。我们使用启用的Trustzone-M SAM L11 MCU来验证这些攻击。还讨论了减轻这些软件攻击的策略。
Internet of Things (IoT) devices have been increasingly integrated into our daily life. However, such smart devices suffer a broad attack surface. Particularly, attacks targeting the device software at runtime are challenging to defend against if IoT devices use resource-constrained microcontrollers (MCUs). TrustZone-M, a TrustZone extension for MCUs, is an emerging security technique fortifying MCU based IoT devices. This paper presents the first security analysis of potential software security issues in TrustZone-M enabled MCUs. We explore the stack-based buffer overflow (BOF) attack for code injection, return-oriented programming (ROP) attack, heap-based BOF attack, format string attack, and attacks against Non-secure Callable (NSC) functions in the context of TrustZone-M. We validate these attacks using the TrustZone-M enabled SAM L11 MCU. Strategies to mitigate these software attacks are also discussed.