The ANDIX research OS - ARM TrustZone meets industrial control systems security

نویسندگان

  • Andreas Fitzek
  • Florian Achleitner
  • Johannes Winter
  • Daniel M. Hein
چکیده

Security by isolation is a longstanding, widely applied, and useful paradigm for achieving security goals such as data and code integrity, confidentiality, and availability. Security by isolation can be used to create Trusted Execution Environments. These environments provide specific security guarantees to the information processing taking place therein. In an Industrial Control System secure control setting using this approach allows, for example, protecting the integrity of a control algorithm against unauthorized modification and secure monitoring of the veracity of received inputs, even in the face of a subverted communication interface. Here, we introduce ANDIX OS, a security Operating System using the ARM TrustZone architecture to create an Trusted Execution Environment. The ARM TrustZone architecture is a set of security extensions for ARM processors based systems. It is widely in use in mobile phones today. We argue that ARM TrustZone is a technology relevant to the Industrial Control System security setting and that research of its applicability should take place now. To this end we freely provide ANDIX OS as open source for research and also present the results of a case study, where we have used ANDIX OS to solve a concrete problem from a smart maintenance for Industrial Control Systems context. We believe that security for Industrial Control Systems is a pertinent topic and that the use of ARM TrustZone as a security technology that comes almost free with a certain class of ARM based systems is worth studying in this context. Therefore, with ANDIX OS, we provide a suitable tool, and hope that actively encouraging researching ARM TrustZones usefulness will create more secure Industrial Control Systems in the future.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LTZVisor: TrustZone is the Key

Virtualization technology starts becoming more and more widespread in the embedded systems arena, driven by the upward trend for integrating multiple environments into the same hardware platform. The penalties incurred by standard software-based virtualization, altogether with the strict timing requirements imposed by real-time virtualization are pushing research towards hardware-assisted solut...

متن کامل

Countermeasure against Side-Channel Attack in Shared Memory of TrustZone

In this paper we introduced countermeasures against side-channel attacks in the shared memory of TrustZone. We proposed zero-contention cache memory or policy between REE and TEE to prevent from TruSpy attacks in TrustZone. And we suggested that delay time of data path of REE is equal or similar to that of data path of TEE to prevent timing side-channel attacks. Also, we proposed security infor...

متن کامل

DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone

Direct Anonymous Attestation (DAA) has been studied for applying to mobile devices based on ARM TrustZone. However, current solutions bring in extra performance overheads and security risks when adapting existing DAA schemes originally designed for PC platform. In this paper, we propose a complete and efficient DAA scheme (DAA-TZ) specifically designed for mobile devices using TrustZone. By con...

متن کامل

TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices

As smart, embedded devices are increasingly integrated into our daily life, the security of these devices has become a major concern. The ARM processor family, which powers more than 60% of embedded devices, introduced TrustZone technology to offer security protection via an isolated execution environment called secure world. Caches in TrustZone-enabled processors are extended with a nonsecure ...

متن کامل

Downgrade Attack on TrustZone

Security-critical tasks require proper isolation from untrusted software. Chip manufacturers design and include trusted execution environments (TEEs) in their processors to secure these tasks. The integrity and security of the software in the trusted environment depend on the verification process of the system. We find a form of attack that can be performed on the current implementations of the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015