2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00061
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the Security of ARM Debugging Features

Abstract: Processors nowadays are consistently equipped with debugging features to facilitate the program analysis. Specifically, the ARM debugging architecture involves a series of CoreSight components and debug registers to aid the system debugging, and a group of debug authentication signals are designed to restrict the usage of these components and registers. Meantime, the security of the debugging features is under-examined since it normally requires physical access to use these features in the traditional debuggin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(40 citation statements)
references
References 16 publications
0
35
0
Order By: Relevance
“…Both Arm TrustZone and Intel SGX security technologies use trust-based security. Being a passive defence method, it does not provide run-time respond and recover functions and found ineffective against wide-range of vulnerabilities and attacks specifically targeting run-time TEE and microarchitecture [6], [7], [12], [13], [16], [19], [20], [21], [22]. 2 Information Flow Tracking is an active defence method that provides run-time security against malicious attacks and software malfunction.…”
Section: Secure-by-design and Security Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Both Arm TrustZone and Intel SGX security technologies use trust-based security. Being a passive defence method, it does not provide run-time respond and recover functions and found ineffective against wide-range of vulnerabilities and attacks specifically targeting run-time TEE and microarchitecture [6], [7], [12], [13], [16], [19], [20], [21], [22]. 2 Information Flow Tracking is an active defence method that provides run-time security against malicious attacks and software malfunction.…”
Section: Secure-by-design and Security Methodsmentioning
confidence: 99%
“…This includes the realisation of mix-critical applications, broader network connectivity, a need for code/data protection, isolation and segregation of resources leading to wider availability of embedded multiprocessing [6], [7], [9]. Where these computing platform advancements brought benefits, they have exposed platforms to wide-range security challenges due to increased system attack surface and micro-architecture vulnerabilities [12], [16], [17], [18], [19], [20], [21], [22].…”
Section: Evolution Of Embedded Platform Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…The executed program is also coded and stored in firmware; thus, it can be blocked by malicious BIOS tampering or bootkits [50]. Furthermore, if the local hardware or hypervisor RoTs are under attack, then the base of chain might be compromised [51], leading to verification errors. Another factor is flexibility: to ensure trustworthiness, users have fewer interfaces for accessing the trust base.…”
Section: A Trust Chain-based Verificationmentioning
confidence: 99%