Bestand wählen
Merken

TrustZone is not enough

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
it and
and and and
the solver next stock would be a balance and embedded system security and Pascal with the speaker will explain how you can hijack the back components for embedded security in AI and processes status not only an advantage of software security engineer but also researcher in this step time solve please gets very very warm welcoming Good morning applause superstars few OK things for introduction so as it was the diamond engineered by the
18 month in the French company so regards a and b the best system security and you but this talk is mainly about masked by Tom activity which is a researcher Article what we call it of this is because of this talk or retrieval of propitious should include my mother died while the wars in history of the bit distant student in a fashion so this talk will be mainly representation and work about uh the emitted system security and especially the components that are available in the in upper so I don't know what they think the advent we also think we have all the slides the documentation and everything
so far yeah I'd be followed view of the Congress I didn't know about what kind of but what do you need far from my talk so put there some links that I need some references of some toast why we you will have all the vocabulary in the effort to understand the artists uh somebody old so you know about the computer architecture on the embedded systems greedy out had attended the virus about the form or verification of software and also in the talk by Jeanne about trusted execution environments so the TA such altruism and you still can we also talk about the FPGA stuff and about the the j is so the walls of tokens the 2 about SBG reverse engineering and if you don't know but if it is our hope that you have some time to go to the of of something because of these guys are doing a great job about open-source tools so all year
when you see this on the slide that I mean that the 1st question is that why I put so
chosen is not enough and just a quick reminder about what is presumed that draws only
is about separating an assistant between an unsecured loan that there in red and the secure world the in in the in grim so when we want to use some of the the chosen framework we are also of hardware components and lots of software components and allowing us to would it safe to run separately a security OS and not secure us but in our case the what we wanted to do is to use the the the components so you can see it on the left side of of the picture to uh to see if we can make some security with it and for more of we are we wanted to use something as that adventurism because but if you attended the talk about the security of in underneath and the which you can see that the chosen framework can be monitored by past under a specific cases uh from all of this talk is something quite complementary because we will do something in had to a role in the I mean at the low level had to preside level soul I will talk about in the right above that talk about what we can do between transient and do you approach developed in this work so basically the
presentation would be up a quick introduction but I will talk about some works are aiming to use their build the components had to make some security and I will talk about Mexico which is the the name of the system we developed and used the components in hopper unfamiliar some results and the conclusion
so again in the context of our project we world are were working Weaver system-on-chips so system-on-chips are kind of this kind of device y we of in the green part of the process also it can be a single goal or do work or even corpus so and so on and off interesting part which is in general in the image here is the problem of logic which is also called an FPGA in this case and in this kind of system which should you also on the other so all this J. as some links between those 2 most 2 units and so so you can see here in the plenary on the red the try a red rectangle so we know 1 of the 2 all so yeah this picture or is there are many major of of system which encodes zinc provided by designing switches of so and if brighter and this kind of sheet we usually have the tool politics and I'm parcels and so Mr. GUG graduate to retrieve the 1st
saw yet so all you want you want to do we the competences to rock about dynamic information for tracking so basically what he's information flow that information flow is the transfer of information from and the information that they know C 1 to C 2 is given process the saw in over roads
if we take the simple code over there before of all labels for instance a W and X the idea is that OK if you have some of the metadata in a that the metadata will be transmitted to them you know in overalls all what on what kind of information we we really that transmits on into the goal was basically all of the information I'm talking in dual and in the 1st block is OK these data all these private is a there is public and that we should not mix of the title which property can private together so basically we can say that the information can be a binary information which is a topic bright that but of course we would be able to have us so the lower levels of of information in the following parts that are this information would be called the taint or even tags and to be honored state to be a bit more simple that we we use some corals to say OK my red or green just to see if it's a private appearing data so yeah and so as I said on if you do have on to do target contained a user is red the data contained in that you will be red as well and the same thing for Serbian X and
if you take another quick example of than so if we look at some of the follow foll so are in the upper side of the slide you are all the you of the gas and decoded and on the or parts of the green column would be on the core all the tags and on the on the right side of this columns of U of and the status of the different registers so of this code is basically OK our 1 my input is where at the beginning so basically we just we just use the thing to be put into the index valuable so basically on the Register 2 which contains a DID X a viable will be a red as well and then when we want to access the brief log out before i x which is the sum of i and II in that industry code at the beginning basically the information that have there will be a red as well and of course are the result of the of the operation which is x there would be a red as well so basically that means that our is very is a tainted he put at the beginning we can we must be able to transmit the via this of information until the return address of this could just to say OK I believe these tainted input is pray that the return address at the end of all of the code there should be should be private as well but
what what can we do with that raises a simple code of their so this is a simple go the same OK but if you are a normal use or if you go in you could you would just have to to open the on on the welcome fighting rising if your or a root user you must are you must open the bus from 5 so this is basically to say OK if we want to open the welcome fight this is a public information you can do whatever you want with it over rising if it's a rule that or if it's a witch's or maybe the best what we can't think for instance a cryptographic key and we should not rule to the printer to the print therefore our function at the end of our at the end of the of this code so basically the idea that it is to check that and the RDFS viable containing the to the top of the of the fight is private operate so are all free steps from that of 1st of all the competition we give us so the assembly code that and then we should modify 1 we must modify the system calls to ah to send the dude tags sold the tags will be as I said before we do so by predict information about about my yeah as as viable and I will talk a bit about that later but are maybe future work so the idea is to make artist by an operating system integrated that uh that we've integrity support so Crawford DFT so our yes
over were already some ranks of both the dynamic information flow tracking so basically we should do this kind of information for tracking in 2 1 0 so the first one of the application of so basically working at the edge of our own country the 100 level there are some works also wrote also propose some solutions at the lowest level for instance the carrier but 1 the wanted to do here is to
recognize the role of a so this is not what the application of your but just at the and what the other 1 of oral atleast the particular bone sorry that the process of level so if you want to have some informations about the the cost of implementation of information for tracking you can go to a b out that uh dashed ideas OK so why you have some implementations of the often under report and the Java port of of into the and intrusion detection systems so yeah i in the rest of my talk I will just go through the use of existing works and just see what you can do about that uh when we talk
about dynamic information for tracking for at the role of of there are many through pushes the first one is we are the 1 in the in the left side of the of the cell of the cell on the set of the size the so basically the idea is to say OK but in the in the upper side of this figure we have do no more just about right so basically a decode stage and and register file and uh and arithmetic and logic unit and the and the basic idea is to say OK I 1 want to process we've tags on things we just duplicates of the process of applying so basically we go with the Brady up applying no under under the roma 1 just to process data and in the bias 2 things 1st of all we must have the source code multiple sites have just to duplicate the Oedipus about going and to make and model that a do th t a planned by so this is not quite a quite quite inconvenient because we must however we must have the source code 4 % which is not are we use is sometimes and on the over Y is the this is the main advantage of this suppose it that's OK we can do nearly anything we want because has to or because so we can have a group or wirelessly we need from the process just to get the information we need yeah yeah on the southern approach so this is the what sort of literature where something a bit more different so instead of having a single person or aiming to do or do not want to full press the information for tracking we should separated on the on the normal execution and via infomercial for talking so this is the 2nd approach rare and this support is not satisfying as well because you would have a 1 running the of application that's OK but the US of course number 2 in the figure over there will be just you are able to make DFT Contel so basically it's it's a bit ashamed just to use a person just to make some of the controls so I had to take the best
compromise we can do is to make but dedicated copper solid just to make the information for tracking a posting so basically all of them are the most interesting when it is the biggest to have the main corpus saw aiming to just to make Dodoma education and a dedicated group so just to make the eyes to compose and you will have some communications between of us recalls so you have
basically if we want to make a quick comparison between different groups so if you want to run of the dynamic information for code full control so we into suffer I would talk about that just like in the in the side after but that this is a really hard really I mean we painfully in terms on top of time already because you will see that by the time to do information for tracking to suffer is really unacceptable I regarding the operator assisted approach are the best advantage in authorities is is that we all have a role or words in terms of of silicon there that means that on this
slide and the and the already between the main port and the main culprit as the corpus or is not is not so important and we will see that
in the in the case of my talk we would see that the debate the the DFT compressed so is is also our is also on that a it is also easier to 2 hour to get some different security prices as so yeah as I said in
in the true so 1st solution to the 1st line of of the stable the the basic idea
that is to use the instrumentation so if you're there on the to the instrumentation is basically the transformation of a program into its own measurement would so basically that means that we we put us some sense holes in or parts of my code the uh just to uh just to monitor this activity and a governor for some information from it so basically if we want to measure the impact of instrumentation on the execution time of an application you can see in this diagram of there are below modification of the which is normalized to 1 and when we want to use instrumentation with it on the minimizer over I do we have is about 75 per cent so basically what would be tween wrote uh the let's say the time we've instrumentation will be most of the time it would be about twice higher that's not the Omar is efficient and so this is completely unacceptable because it would just run straw your your application so basically yeah has I said
that the main and the main concern about my talk is about reducing the overhead of suffer intimidation I will talk of so a bit about the security of the DFT corpus because we can't do that difficult include the DFT corpus so we won't be taking care of its security and this is uh accounting to my to my knowledge this is the 1st work about the DFT in the HMM-based system-on-chips that are
on the on the talk about the secret of doing it and the switch of the speaker said that that was the thing is that is that is that it isn't in our case we have of where are only a black box because we can't modify the structure of the press we must make each of are our job we've and they decapping the precise and so on so basically uh
this is a novel a schematic of our architecture and so on the left side that we're all in light we knew of the of the so basically in this case this is a simplified version we've only 1 core and on the right side you of the structure of the of the corpus are implemented in the FPGA so basically you can notice here for instance uh for for the moment sorry about 2 things the 1st is that the value of some links between the of the FPGA and this appeal of these things are always the trip already existing in in in the system chip and you can see another thing is that there are there are again in the memory you are separate memory for the for the person and for the effigy and we will see later that Wikinews present in because of just 2 of the of security just to be sure that we want so we want to have the same makes the memory between the CPU and the and the FPGA so basically we will want to
work we're on my rear composed so we must use on that shit through massive under the sheets and 1st of all don't be
afraid but the length of time that the sheets because in my case I used to work ve on the set of technical manure which is already 2000 pages of the on the way to manual is about 6 thousand pages anyway on and off all of course our Moon what is also difficult that the information in is speed between different arguments anyway when we want to use the the the components are in the case of we just have this urge it's over which is called the DBG blah-blah-blah so we can see that in this region so we can say that OK writing the key value of this will see 5 a blog about to this we look at the bigger several you wait any overvalue it will adjust the anode was the Buddha's so that was basically are the 1st step to arm to enable the hippocampus was just 2 of 2 whites around them for you to do is that which is to this register just to look at my mind about components so here is again there
on let's say a schematic of the overall system achieved so they can see you we all know thing to pursue and on the top part 2 of the what how good the across such components so these are the famous of the components I will talk about in the 2nd part of my talk so
here is a simplified view of the competence we have them in and in the cancer scenes so basically uh on the left side of the left side we have the due to process also just accuse you answered you want and on the course I components of the sea and so do 1 of which is the you know the red the rectangle and also the city which is the embittered costs a trigger and the and which is the instrumentation trace Microsoft and basically what we want to annotate extract some data from these costs of components that the basic the basic path would be OK we use the PTM and we follow the red line rule for the following and at this step we have 2 choices to store the information taken over from the from the components the 1st 1 is the and that he before which is of explored memory and in the persona of fertility recent memory is really a rule because it is really small so it because it's only about 4 kilo bytes so as far as I remember but the over of possibility is just to export something that to be traced back at the output and this is what we use just expect something that to the to the so to the corpus so sorry implementing in the in the future at
so basically what the is able to do that the 1st thing and that it can can do is to trace whatever you whatever you want to enumerate for instance you can trace audio cuts of basically all the blue of blue sections but you can also and you you can so that it's a trace of a specific region of the good so basically that means that you can say OK I just want to trace the code in my section 1 on the or section 2 or section and
and then the term is also able to make some branch casting uh that is something that was not present in the in itself so we already submitted a batch and that was accepted 2 are 2 are detector amounted to run once for casting go into the detail and we can do some time style type something and everything just to be able to on to store the information here in the traces so basically what the
traces of what the trace to excite so it was the most simple could we could add is just before or doing nothing so basically that's something code or avail and the trace we look at this so are in the in the 1st part of the 1st those 5 bytes we have of the some some kind of stop pockets which is called the AC at just to say OK this is the beginning of the face and in the green part we'll have the address which correspond to the start at the beginning of the rope and that in 2 0 inch part we'll have our the other branch address packets so you can see that view the 10 iterations of this merger respected because we have 10 iterations of the forum so this is just to show what is the general structure of of of a trace the I
yeah Selena rose adjustable before but just to say are what we could have about this so of course if we have the normal plant and of the scope of a graph it we've just priming the trace of a trigger just to update the information about the about the 2nd about I
want you of all of these traces and the next step is to say OK I have my times but now how how do I that the defined the walls between the between trying to adjust for speed might as and this is where we we use the static analysis for this so basically here in this example free of the insertion OK uh just do and how uh were just want this which is to output put the ridges of the results in would just as they were so what is through the use of static analysis which allows us to say OK the tag the tag associated we've registers a will be the type of register 1 all that I go off from all registered to an esthetic analysis will be done that before winning Michael just say OK i of Waterloo was needed for borderline some of my code so about 2 of the trace we know how to transmit the uh the and the time all of a microbe the final step would
be just to make the static and exists in the in the in the the M back-end and the final step
will be but instrumentation so as I said before we can uh we can recover all the memory addresses we need true instrumentation otherwise we can post so are in the in the 2nd pass can also on the on that's a gets a do a register related member reduces through instrumentation in the 1st phase
of this simple uh we we can basically just they just say OK we instrument all the cold but the main the main drawback of this solution is that OK we between you compute the on intracompany X as the the time of of the exception although was what you can do is that OK we've on with the distance from there we can get on data from the trace so basically we we use the program counter address from the trace and then followed the stack pointer we use the static Anais's to get information from the stack pointer and finally we can use on you want in some of the key somewhat it's so instruction at the end so if I go back to
this arm to the in yeah
the communication overhead will be on domain and it's a demand drawback on as I said before because OK but if
we have over there the purser and the PGA are ringing in in our in different parts the main that's a problem with the whole we can transmit data in real time what most atleast in the in the in the in values that you can between the person and if a
j so yeah the the T M R so we see that they're doing this at the time of
red would be a neighbor across a and some not so basically in blue we have and the the time or the let's say the basic Tummarello 1 the traces of the 7 and we can see that when we when we neighbor traces of the time over word is nearly is nearly negligible so on yeah
it's I regarding time instrumentation and we can see that they're regarding the strategy to which is you are using these 2 because I components using the esthetic and this and this term addition we can draw world that is the instrumentation of words from 54 per cent of the Dome 5 % so this is basically OK with that of some of red that due to instrumentation really low compared to the the graphs where all the code was instrumented and this is an
overview and that uh that shows that they're in the gray lines you of some of some or it's off the read the grocery fully instrumentation and we can see that the number of put should we should really be lines over there and that the over the time already we've we've all called is much much stroma was more
absurd so yeah so basically on that's how we can use a chosen this so this is just an overview of our system and we can say OK we can use resident just to seperate distribu from the from the FPGA corpus
so if we make a comparison between the Weaver within the rest we can see that compared to the 1st works we are able to make some information for contour we've and half the cell which is which was not the case we we have the 2 frustrates in this table so it means that OK you can use the Bayes a compass so just to make the information for tracking instead of having the best the strippers for and of course on the yeah the relevant which is another important topic is much much through our company to the next thing graphs so it's
time for the country and so yeah that's
presenting this so we have uh but to use the the bits and company just on obtaining a runtime information about repetition uh this is a non intrusive tracing because are we still have a negligible performance over an hour and then we also include the software security just because we were able to make some security of on the corpus so
the future perspective of that is to may need to work we've multi-corpus corpus and to see if we can use that as the same approach Freud internal and maybe it's Michael Contras specific and also do information through Turkey's space so that was
basically from my toast thanks for listening heart thank you very much of a sock unfortunately we don't have time for our Q and a solver and please if you leave the room and take interest with you and this makes the engines have the correlated only on about by was a bit lonely polluted and ends in another round of applause for both guys thank you want to watch it
if you if you have a a in but it could and would like to people
Summengleichung
Rhombus <Mathematik>
Komponente <Software>
Software
Computersicherheit
Güte der Anpassung
Physikalisches System
Information
Pascal-Zahlendreieck
Bildauflösung
Information Retrieval
Clifford-Algebra
Computervirus
Bit
Selbstrepräsentation
t-Test
Pascal-Zahlendreieck
Bildschirmmaske
Field programmable gate array
Reverse Engineering
Software
Prozess <Informatik>
t-Test
Sichtenkonzept
Reverse Engineering
Computersicherheit
Open Source
Programmverifikation
Token-Ring
Programmierumgebung
Physikalisches System
Binder <Informatik>
Kombinatorische Gruppentheorie
Rechenschieber
Software
Komponente <Software>
Verschlingung
Computerarchitektur
Programmierumgebung
Horizontale
Hardware
Computersicherheit
Spielkonsole
Firmware
Gebäude <Mathematik>
Pascal-Zahlendreieck
Framework <Informatik>
Übergang
Rechenschieber
Physikalisches System
Rechter Winkel
Komponente <Software>
Computersicherheit
Notepad-Computer
Peripheres Gerät
Resultante
Hydrostatik
Prozess <Physik>
Computersicherheit
Rechteck
Aggregatzustand
Physikalisches System
Binder <Informatik>
Kontextbezogenes System
Kombinatorische Gruppentheorie
Mathematische Logik
Analysis
Open Source
Software
Einheit <Mathematik>
Field programmable gate array
System-on-Chip
Komponente <Software>
Mereologie
Computersicherheit
Projektive Ebene
System-on-Chip
Zentraleinheit
Bildgebendes Verfahren
Objektverfolgung
Bit
Prozess <Physik>
Prozess <Informatik>
Kategorie <Mathematik>
Gasströmung
Wärmeübergang
p-Block
Information
Datenfluss
Code
Übergang
Metadaten
Wärmeübergang
Mereologie
Information
Datenfluss
Instantiierung
Aggregatzustand
Resultante
Gewichtete Summe
Kontrollstruktur
Sampler <Musikinstrument>
Hochdruck
Adressraum
ROM <Informatik>
Code
Physikalisches System
Pufferspeicher
Code
Netzbetriebssystem
Adressraum
Wurzel <Mathematik>
Nichtlinearer Operator
Lineares Funktional
Elektronische Publikation
Assembler
Schlussregel
Physikalisches System
Ein-Ausgabe
Integral
Rechenschieber
Automatische Indexierung
Mereologie
Bus <Informatik>
Speicherabzug
Information
Schlüsselverwaltung
Instantiierung
Prozess <Physik>
Freier Ladungsträger
Diskretes System
Applet
Implementierung
Übergang
Kartesische Koordinaten
Datenfluss
Übergang
Weg <Topologie>
Eindringerkennung
Rangstatistik
Disk-Array
Information
Verkehrsinformation
Instantiierung
Web Site
Bit
Prozess <Physik>
Gruppenkeim
Arithmetisch-logische Einheit
Zahlenbereich
Zellularer Automat
Gasströmung
Kartesische Koordinaten
Quellcode
Elektronische Publikation
Quick-Sort
Coprozessor
Multiplikation
Menge
Einheit <Mathematik>
Speicherabzug
Gamecontroller
Decodierung
Information
Figurierte Zahl
Autorisierung
Nichtlinearer Operator
Subtraktion
Diskretes System
Gruppenkeim
Paarvergleich
TOE
Term
Code
Coprozessor
Rechenschieber
Physikalisches System
Software
Computersicherheit
Speicherabzug
Energiedichte
Gamecontroller
Wort <Informatik>
Information
Zentraleinheit
Binärcode
Subtraktion
Computersicherheit
Polare
Gasströmung
Telekommunikation
Analysis
Inverser Limes
Coprozessor
Physikalisches System
Software
Framework <Informatik>
Speicherabzug
Energiedichte
Computersicherheit
Overhead <Kommunikationstechnik>
Messprozess
Zentraleinheit
Schnittstelle
Bit
Diskrete Fourier-Transformation
Kartesische Koordinaten
Transformation <Mathematik>
Code
Physikalisches System
Computersicherheit
Optimierung
Einflussgröße
Binärcode
Extremwert
Transformation <Mathematik>
Computersicherheit
Rechenzeit
Telekommunikation
Übergang
Gasströmung
Frequenz
Inverser Limes
Coprozessor
Software
Diagramm
Framework <Informatik>
System-on-Chip
Mereologie
Overhead <Kommunikationstechnik>
Information
Messprozess
Overhead <Kommunikationstechnik>
Zentraleinheit
Programm
Mathematische Logik
Prozess <Informatik>
Spielkonsole
Blackbox
Computersicherheit
Versionsverwaltung
Physikalisches System
Binder <Informatik>
Kombinatorische Gruppentheorie
Zentraleinheit
ROM <Informatik>
Keller <Informatik>
Coprozessor
Unternehmensarchitektur
Physikalisches System
Komponente <Software>
Softwaretest
Prozess <Informatik>
Festspeicher
Computersicherheit
Datenstruktur
Unternehmensarchitektur
Zentraleinheit
Speicherverwaltung
Instantiierung
Parametersystem
Subtraktion
Dicke
Theorem
Web log
Prognostik
Ruhmasse
Homepage
Homepage
Menge
Datumsgrenze
Komponente <Software>
Information
Prozess <Physik>
Sichtenkonzept
Rechteck
Schlussregel
Physikalisches System
Demoszene <Programmierung>
Open Source
Komponente <Software>
Physikalisches System
Komponente <Software>
Festspeicher
Mereologie
Speicherabzug
Information
p-Block
Ablaufverfolgung
System-on-Chip
Gerade
Auswahlaxiom
Funktion <Mathematik>
Programm
Verzweigendes Programm
Verzweigendes Programm
Dreiecksfreier Graph
Digitalfilter
E-Mail
Term
Kontextbezogenes System
Code
Auswahlverfahren
Homepage
Garbentheorie
Code
Datentyp
Speicherabzug
Garbentheorie
Information
Ablaufverfolgung
Stapelverarbeitung
Druckertreiber
Schnitt <Graphentheorie>
Instantiierung
Verzweigendes Programm
Decodierung
Sichtenkonzept
Synchronisierung
Graph
Green-Funktion
Adressraum
Verzweigendes Programm
Iteration
Code
Graph
Quellcode
Webforum
Adressraum
Mereologie
Information
Datenfluss
Ablaufverfolgung
Resultante
Hydrostatik
Einfügungsdämpfung
Freeware
Code
Analysis
Hydrostatik
SLAM-Verfahren
Code
Front-End <Software>
Datentyp
Ablaufverfolgung
Funktion <Mathematik>
Analysis
Tabelle <Informatik>
Hydrostatik
Adressraum
Ausnahmebehandlung
ROM <Informatik>
Analysis
Strategisches Spiel
Wiederherstellung <Informatik>
Adressraum
Speicheradresse
Information
Abstand
Zeiger <Informatik>
Optimierung
Phasenumwandlung
Message-Passing
Programm
Hydrostatik
Telekommunikation
Mathematische Logik
Sechsecknetz
Sender
Prozess <Informatik>
Telekommunikation
ROM <Informatik>
Analysis
Strategisches Spiel
Keller <Informatik>
Coprozessor
Unternehmensarchitektur
Physikalisches System
Komponente <Software>
Software
Domain-Name
Echtzeitsystem
Mereologie
Overhead <Kommunikationstechnik>
Ordnungsreduktion
Overhead <Kommunikationstechnik>
Zentraleinheit
Speicherverwaltung
Dijkstra-Algorithmus
Komponente <Software>
Hydrostatik
Advanced Encryption Standard
Speicherabzug
Overhead <Kommunikationstechnik>
Telekommunikation
Wort <Informatik>
Schnelle Fourier-Transformation
Ordnungsreduktion
Ablaufverfolgung
Analysis
Strategisches Spiel
Programm
Mittelwert
Addition
Rechenzeit
Konfigurationsraum
Benchmark
Telekommunikation
Ungerichteter Graph
Term
Code
Modul <Software>
Strategisches Spiel
Komponente <Software>
Komponente <Software>
Strategisches Spiel
Wort <Informatik>
Overhead <Kommunikationstechnik>
Druckertreiber
Parallele Schnittstelle
Zahlenbereich
Physikalisches System
ROM <Informatik>
Strategisches Spiel
Coprozessor
Komponente <Software>
Autorisierung
Zahlenbereich
Computersicherheit
Overhead <Kommunikationstechnik>
Flächeninhalt
Schnelle Fourier-Transformation
Gerade
Sechsecknetz
Zirkel <Instrument>
Snake <Bildverarbeitung>
Paarvergleich
Zellularer Automat
Telekommunikation
Ungerichteter Graph
Paarvergleich
Frequenz
Geometrische Frustration
Verknüpfungsglied
Leistung <Physik>
Ordnungsbegriff
Overhead <Kommunikationstechnik>
Flächeninhalt
Information
Zentraleinheit
Tabelle <Informatik>
Umwandlungsenthalpie
Perspektive
Bit
Multiplikation
Rechenzeit
Computersicherheit
Rechenzeit
Telekommunikation
Maßerweiterung
Information
Raum-Zeit
Intel
Komponente <Software>
Rastertunnelmikroskop
Software
Perspektive
Speicherabzug
Computersicherheit
Overhead <Kommunikationstechnik>
Information
Zentraleinheit
Hypermedia
Systemprogrammierung
Eindringerkennung
Unrundheit
Pascal-Zahlendreieck

Metadaten

Formale Metadaten

Titel TrustZone is not enough
Untertitel Hijacking debug components for embedded security
Serientitel 34th Chaos Communication Congress
Autor Cotret, Pascal
Lizenz CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34951
Herausgeber Chaos Computer Club e.V.
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract This talk deals with embedded systems security and ARM processors architecture. Most of us know that we can perform security with the ARM TrustZone framework. I will show that most ARM processors include debug components (aka CoreSight components) that can be used to create efficient security mechanisms.
Schlagwörter Security

Zugehöriges Material

Folgende Ressource ist Begleitmaterial zum Video
Video wird in der folgenden Ressource zitiert

Ähnliche Filme

Loading...
Feedback