Arm issued a statement on Friday saying that a successful side-channel attack on its TrustZone-based Cortex-M system "does not mean that the protection provided by the architecture has failed."
"Security extensions to the Armv8-M architecture are not meant to protect against side-channel attacks due to control flow or memory access patterns. In fact, such attacks are not specific to the Armv8-M architecture; they may apply to any code, depending on cryptographic control flow or memory access patterns," Arm said.
Arm issued a statement at last week's Black Hat Asia infosec conference - titled "Give me your secrets, MCU! Microarchitectural timing attacks on microcontrollers are practical" - claiming that the chip design The company's microcontrollers are vulnerable to side-channel attacks.
Building on the discovery of Specter and Meltdown in 2018 - Intel CPU architectural vulnerabilities that opened a Pandora's box of microarchitectural transient side-channel attacks - researchers from the University of Minho (UdM) in Portugal successfully set out to prove that MCUs present similar risk attacks.
Historically, microarchitectural attacks have primarily affected servers, PCs, and mobile devices. Microcontrollers (MCUs) like Arm's Cortex-M are unlikely targets due to their simplicity. However, a successful attack would have significant consequences because, as UdM researchers Sandro Pinto and Cristiano Rodrigues explained at Black Hat Asia last Friday, MCUs can be found in almost every IoT device.
The researchers call their discovery the first microarchitectural side-channel attack on an MCU, a technique that uses observation to recover or steal system information to bypass CPU memory isolation protections.
The researchers outline that the attack exploits timing differences exposed through bus interconnect arbitration logic. When two bus masters within an MCU (eg CPU and direct memory access (DMA)) issue transactions to access values in memory, the bus interconnect cannot handle both at the same time. It prioritizes one and delays the other.
The researchers used this logic to observe how much a compromised application—in this case, a trusted application that interfaced with the trusted keypad in a smart lock—was delayed in order to infer a password PIN.
This process is automated by using peripherals to automatically execute spy logic in the background, independent of the CPU.
Arm has a huge market share in MCU, CPU and bus interconnect designs. Its TrustZone-M technology combines with other measures to protect the entire MCU against tampering - including side-channel attacks. At the very least, Arm aims to make such attacks "uneconomical."
But at the Black Hat Asia conference, researchers disputed Arm's claims.
"We can basically break all the security isolation guarantees in Arm MCUs, including state-of-the-art technology with TEE TrustZone-M technology," Pinto told The Register.
Researchers have disclosed hacking information to Tf-m and STMicroelectronics, as well as Arm.
Rodrigues and Pinot said Tf-m acknowledged the hack but said the root cause was a memory tracking issue and therefore the application was at fault. STMicroelectronics is also targeting Arm and an application. Arm, meanwhile, told the team that side-channel attacks were not within the threat model and that its security was in line with industry standards — a tactic that Pinto said Intel was initially trying to use when news of Specter and Meltdown broke.
“We kind of agree with Tf-m,” Pinto said, noting that it would be costly for Arm to implement the necessary changes.
In its announcement, Arm suggested that attacks can be mitigated by ensuring that a program's control flow and memory access patterns do not rely on secret state.
“This is already a common feature in security-critical code such as cryptographic libraries,” Arm said.
"Arm is committed to improving security and enabling the ecosystem to build more secure solutions. An example of this is the 'Data Independent Timing' feature introduced in the Armv8.1-M architecture. Although this feature does not mitigate the specific attacks, but it helps prevent data-dependent timing side-channel attacks,” Arm added.
The researchers revealed that if they could demonstrate a similar attack variant in an application that didn't secretly rely on memory paths, they might be able to change Arm's mind.
"This is our main motivation and challenge now," Pinto told The Register.
Previous article:element14 community launches the third "Road to Programmability" training event
Next article:Mouser Now Available Microchip Technology WBZ451 Curiosity Development Board for Prototyping Wireless Applications
- Popular Resources
- Popular amplifiers
- Naxin Micro and Xinxian jointly launched the NS800RT series of real-time control MCUs
- How to learn embedded systems based on ARM platform
- Summary of jffs2_scan_eraseblock issues
- Application of SPCOMM Control in Serial Communication of Delphi7.0
- Using TComm component to realize serial communication in Delphi environment
- Bar chart code for embedded development practices
- Embedded Development Learning (10)
- Embedded Development Learning (8)
- Embedded Development Learning (6)
Professor at Beihang University, dedicated to promoting microcontrollers and embedded systems for over 20 years.
- Intel promotes AI with multi-dimensional efforts in technology, application, and ecology
- ChinaJoy Qualcomm Snapdragon Theme Pavilion takes you to experience the new changes in digital entertainment in the 5G era
- Infineon's latest generation IGBT technology platform enables precise control of speed and position
- Two test methods for LED lighting life
- Don't Let Lightning Induced Surges Scare You
- Application of brushless motor controller ML4425/4426
- Easy identification of LED power supply quality
- World's first integrated photovoltaic solar system completed in Israel
- Sliding window mean filter for avr microcontroller AD conversion
- What does call mean in the detailed explanation of ABB robot programming instructions?
- 2024 China Automotive Charging and Battery Swapping Ecosystem Conference held in Taiyuan
- State-owned enterprises team up to invest in solid-state battery giant
- The evolution of electronic and electrical architecture is accelerating
- The first! National Automotive Chip Quality Inspection Center established
- BYD releases self-developed automotive chip using 4nm process, with a running score of up to 1.15 million
- GEODNET launches GEO-PULSE, a car GPS navigation device
- Should Chinese car companies develop their own high-computing chips?
- Infineon and Siemens combine embedded automotive software platform with microcontrollers to provide the necessary functions for next-generation SDVs
- Continental launches invisible biometric sensor display to monitor passengers' vital signs
- Another technical solution for power-type plug-in hybrid: A brief discussion on Volvo T8 plug-in hybrid technology
- Why is there a short erroneous data transition in FPGA timing?
- Request gerber to pcb altium designer format
- What is PWM? Principle of PWM
- Design of a New Monolithic Switching Power Supply
- Answer questions to win gifts | World Peace Group NXP Solutions Show
- Summary of calculation methods for crystal oscillator load capacitance and frequency deviation
- 【AT-START-F425 Review】USB to CAN final chapter: Communicating with the car ECU
- Sensor acquisition
- [CH563L Review] Part 3 Based on uCos, using FIFO algorithm to achieve zero wait, any baud rate FreeModbus RTU
- Introduction to the essential thermal management system in electric vehicle battery pack design