Proceedings 2017 Network and Distributed System Security Symposium 2017
DOI: 10.14722/ndss.2017.23227
|View full text |Cite
|
Sign up to set email alerts
|

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(31 citation statements)
references
References 10 publications
0
30
0
1
Order By: Relevance
“…On the other hand, due to the strong interactivity of TEE, the universal TEE architecture directly exposes the secure world interface to non-privileged users in the non-secure world [2], which means that any non-privileged user can attack the TEE. Additionally, a lot of attacks exploit vulnerable error codes to destroy TEE security [13], [14]. Multiple security vulnerabilities have been discovered in the TEE kernel of major vendors [15]- [19].…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, due to the strong interactivity of TEE, the universal TEE architecture directly exposes the secure world interface to non-privileged users in the non-secure world [2], which means that any non-privileged user can attack the TEE. Additionally, a lot of attacks exploit vulnerable error codes to destroy TEE security [13], [14]. Multiple security vulnerabilities have been discovered in the TEE kernel of major vendors [15]- [19].…”
Section: Related Workmentioning
confidence: 99%
“…The impact on the embedded device will be deeply analyzed from the root cause to the failure to provide useful information for the failure-tolerant mechanisms. Once detected, a vulnerability will be also communicated to the Common Vulnerability and Exposure (CVE) repository 5 .…”
Section: Research Questions and Proposed Approachmentioning
confidence: 99%
“…Анализ процесса инициализации мобильных устройств показывает, что программный код большинства модулей firmware загружается и исполняется до момента загрузки операционной системы. При этом часть из этих модулей остается в памяти и после ее загрузки [1][2][3][4][5]. Для примера на рис.…”
Section: анализ мобильного устройства как объекта оценкиunclassified