To search, Click below search items.

 

All Published Papers Search Service

Title

Verifying Trusted Code Execution using ARM Trustzone

Author

R.Sebas Sujeen, Sridhar Periasami

Citation

Vol. 13  No. 10  pp. 41-46

Abstract

In this paper, we present a comprehensive analysis of a software based attestation system, Pioneer [1] which was designed for the x86 processor architecture and show how it would fail for RISC processor architecture like ARM. We then present an overview of the Security Extensions implemented in Cortex-A9 processors and higher, referred to as Trustzone[2] and how it can be leveraged to guarantee trusted code execution even on untrusted systems. We also discuss TOCTOU (Time of Check, Time of Use) issues with remote attestation and how it can be resolved leveraging Trustzone. We conclude with a discussion of how this can be used to implement a Kernel Integrity monitor that can be used to detect sophisticated malware like rootkits.

Keywords

remote attestation, Trustzone, TOCTOU attack, NS bit, rootkit, Kernel Integrity Monitor

URL

http://paper.ijcsns.org/07_book/201310/20131006.pdf