[Cryptech Tech] ARM trust zone
Peter Gutmann
pgut001 at cs.auckland.ac.nz
Mon Feb 23 13:15:04 UTC 2015
Joachim Strömbergson <joachim at secworks.se> writes:
>From my experience talking to and working with TrustZone, TEE people that is
>really part of the security model though. If you can get an escape from the
>TA inside the TEE, most people seem in the field seems to understand that any
>secrets inside the TEE are then free for taking.
It's not just the secrets, it's that anything outside the TEE, like malware-
protection software, can't see in. This makes it the perfect place for an
undetectable, unremovable rootkit, which is exactly what some folks did a year
or two back (another attack-the-insecure-bit-from-inside-the-secure-bit
attack, compromising the TEE to get the rootkit in wasn't too difficult).
So you've got a "secure" environment that (a) isn't very secure and (b) can't
be defended against once compromised.
>The ones that don't like this are the ones pushing for having a Secure
>Element as the next protection level.
Given that ARM already has a whole string of operating modes, do you really
need to use the TEE? Just going with some standard kernel that supports more
than the usual embedded all-in-one mode will give you a lot of the benefit of
the TEE without all the complications.
>FIDO is really interesting in many ways. You could probably write a chapter
>for Engineering Security on its security model, design, mechanisms etc. ;-)
I think all I need to do is point to this XKCD cartoon:
http://xkcd.com/927/
Peter :-).
More information about the Tech
mailing list