Volume 11 - Issue 4
Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM Platform
- Naiwei Liu
Institute for Cyber Security, University of Texas at San Antonio, San Antonio TX 78249, USA
- Meng Yu
Roosevelt University, Chicago IL 60605, US
myu04@roosevelt.edu
- Wanyu Zang
Roosevelt University, Chicago IL 60605, US
- Ravi Sandhu
Institute for Cyber Security, University of Texas at San Antonio, San Antonio TX 78249, USA
Keywords: ARM TrustZone, System Security, Side-Channel Attack
Abstract
Security concerns on ARM platform have been developing in recent years, with some security design
and implementations being introduced on ARM platform. As ARM structure is developing into
ARMv8 version, some security research and design had been applied into recent chips. For example,
TrustZone applies to security concerns of users with ARM Cortex-A and Cortex-M series chips,
providing secure and private enclaves. However, the security design on ARM is severely challenged
by different type of attackers. Side-channel attack is one of the major threats to ARM platform with
TrustZone. In this paper, we have discussions on the performance and overhead of TrustZone and
cache-related instructions, and some stats of side-channel attack. Our experimental and theoretical
evaluations can help in design of defense framework based on ARM TrustZone, and provide evidence
of how efficient FLUSH operations can work in defense against cache threats.