Download presentation
Presentation is loading. Please wait.
Published byMariana Simmons Modified over 9 years ago
1
1 September 1, 2014
2
Motivation Background TrustDump Architecture Implementation Details Evaluation Summary 2
3
Motivation Background TrustDump Architecture Implementation Details Evaluation Summary 3
4
In-the-box approach (Thing et al., 2010; Sylve et al., 2011) Vulnerable to armored malware using anti-forensics Virtual Machine Introspection (VMI) (Yan et al., 2012) Trusted Computing Base (TCB) is large Hardware-based solution: ( Android Debug Bridge (ADB), JTAG, Chip-off) ADB and JTAG: need the support of the forensic target Chip-off: physical damage and usually irreversible 4
5
Reliable Against malicious mobile OS Withstand mobile OS crash Small TCB Non-invasive 5 ARM TrustZone
6
TrustZone A system-wide approach Two isolated execution domains: secure domain and normal domain TZIC (TrustZone Interrupt Controller) Secure interrupt--FIQ Non-secure interrupt--IRQ GPIO (General Purpose I/O) 6
7
Trusted Application (TA) deployed in TrustZone in the payments at point of sale (POS) (Marforio et al., NDSS’14) Trusted Language Runtime in TrustZone (Santos et al., ASPLOS’14) Isolate Guest OS and Hypervisor with TrustZone (Kalkowski et al., FOSDEM ’14) 7
8
8
9
TrustDump Deployment Port Rich OS to the normal domain Install the TrustDumper in the secure domain Reliable Switching Non-maskable interrupt (NMI) Data Acquisition and Transmission Online and offline memory forensics 9
10
Freescale i.MX53 Quick Start Board A Cortex-A8 1GHz Processor 1GB DDR3 RAM 4GB MicroSD card Android 2.3.4 in normal domain Thinkpad-T430 10
11
Android Porting Based on the Board Support Package published by Adeneo Embedded Intended to run in the secure domain Access resource of secure domain in normal domain: secure I/O interfaces void secure_write(unsigned int data, unsigned int pa); unsigned int secure_read(unsigned int pa); Self-contained TrustDumper in the secure domain 11
12
12
13
Configure User-defined button 1 as NMI I. Enable FIQ exception: CPSR.F=0 II. Ensure CPSR.F cannot be modified by the normal domain: SCR.FW=0 III. Enforce the ARM processor to branch to the monitor mode on an FIQ exception: SCR.FIQ=1 IV. Configure GPIO-2 as secure peripheral 13
14
Button 1 is for NMI in secure domain and Button 2 is used as the Home Key in normal domain 14 Disable the non-secure access to Button 1 The non-secure access to Button 2 is disabled User-defined Button 1 and 2 share the same access policy
15
Set the peripherals sharing the same policy as secure peripheral Release those peripherals needed in the normal domain by adding them into the Whitelist in secure domain The Rich OS uses the secure I/O interfaces to access the released peripherals 15
16
One interrupt number for all the 32 pins of GPIO-2 Button 2 will trigger the same NMI, instead of serving as the Home Key as designed in the Rich OS Forward the interrupt requests of button 1 and button 2 to different domains 16
17
17 Button 1 Button 2
18
Data Acquisition and Transmission Integrity Checking and Rootkit Detection 18 stack pointer & (0x1FFFF)
19
Switching time NMI: 1.7 us SMC: 0.3 us Memory Dumping Performance 19 Scale (Byte)Bit rate (bit/s) DMACPU 1092178.1292178.49 10092163.3892165.45 1K92163.0192163.43 10K92163.0992163.11 Analysis time Kernel Integrity Checking: hardware (1.56 ms), software (578.6 ms) Processes Traversing: 2.13 ms
20
TrustDump Reliable memory acquisition mechanism based on TrustZone Hardware-assisted isolation NMI as the reliable switching Fine-grained peripheral control and fine-grained interrupt control 20
21
hsun01@wm.edu 21
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.