TEE-Time: A Dynamic Cache Timing Analysis Tool for Trusted Execution Environments

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this article, we present a tool to analyze cache timing vulnerabilities in trusted execution environments. First, we present a platform based on the well-known gem5 simulator capable of booting GlobalPlatform Compliant TEEs for ARMV8 architecture. Next, we present the associated GDB instrumentation which allows us to dynamically reconfigure the gem5 simulator and access detailed micro-architectural state after each simulation step. Unmodified Linux/TEE binaries can be run on this platform, from which detailed execution and cache access traces are gathered and analyzed on-the-fly.We demonstrate the usage of this tool, first with an in-vitro experiment to explain the concepts of Key-Cache lines, Key-Execution Points, a method to rank these lines in an increasing order of vulnerability, and code coverage. We show that real vulnerabilities can be detected with our tool, in an otherwise constant-time RSA implementation inside an open Source TEE called OP-TEE.

Original languageEnglish
Title of host publicationProceedings of the 25th International Symposium on Quality Electronic Design, ISQED 2024
PublisherIEEE Computer Society
ISBN (Electronic)9798350309270
DOIs
Publication statusPublished - 1 Jan 2024
Event25th International Symposium on Quality Electronic Design, ISQED 2024 - Hybrid, San Francisco, United States
Duration: 3 Apr 20245 Apr 2024

Publication series

NameProceedings - International Symposium on Quality Electronic Design, ISQED
ISSN (Print)1948-3287
ISSN (Electronic)1948-3295

Conference

Conference25th International Symposium on Quality Electronic Design, ISQED 2024
Country/TerritoryUnited States
CityHybrid, San Francisco
Period3/04/245/04/24

Fingerprint

Dive into the research topics of 'TEE-Time: A Dynamic Cache Timing Analysis Tool for Trusted Execution Environments'. Together they form a unique fingerprint.

Cite this