Overview
Explore a groundbreaking research presentation on a novel bus fault attack that compromises Trusted Execution Environments (TEEs) in embedded systems. Delve into the vulnerabilities of SoC system buses, uncovering fault characteristics in both data and address buses. Learn how these vulnerabilities can be exploited to mount end-to-end attacks on commercial TEE implementations like OP-TEE. Examine loopholes in TEE specifications and Linux function return conventions that aid adversaries. Gain crucial insights into the need for revisiting API specifications and TEE implementations for embedded systems, considering adversaries capable of faulting not just processors and memory, but also system buses. Understand the importance of holistic security approaches that account for both software implementation and the execution environment in embedded systems.
Syllabus
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments
Taught by
Black Hat