Paper 2025/589
Defeating AutoLock: From Simulation to Real-World Cache-Timing Exploits against TrustZone
Abstract
In this article, we present for the first time a cross-core Prime+Probe attack on ARM TrustZone, which bypasses the AutoLock mechanism. We introduce our simulation- driven methodology based on gem5 for vulnerability analysis. We demonstrate its utility in reverse engineering a SoC platform in order to study its microarchitectural behavior (caches, etc.), inside a simulator, in spite of hardware protection. We present a novel vulnerability analysis technique, which takes into account the cache set occupancy for targeted victim executable. This proves to be essential in identifying information leakage in presence of AutoLock. The above tool also identifies the cache lines leaking a maximum amount of information. A cross-core Prime+Probe attack is then mounted on these max-leakage cache lines both in simulation for fine-tuning, and in real hardware. We validate our analysis and attack method on OP-TEE, an open-source trusted execution environment running on RockPi4 a board based on RK3399 SoC. More specifically we target the RSA subroutine in the MbedTLS library used inside OP-TEE. Despite the presence of AutoLock, multiplier obfuscation, and assuming a cross-core attack, we are able to retrieve 30% of the key bits, which can later be used in Branch-and-Prune methods to recover the full key.
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- SoCgem5SecurityVirtual PlatformPenetration TestingTEEMicro-Architectural AttacksReverse Engineering
- Contact author(s)
-
quentin forcioli @ telecom-paris fr
sumanta chaudhuri @ telecom-paris fr
jean-luc danger @ telecom-paris fr - History
- 2025-04-04: approved
- 2025-04-01: received
- See all versions
- Short URL
- https://ia.cr/2025/589
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/589, author = {Quentin Forcioli and Sumanta Chaudhuri and Jean-Luc Danger}, title = {Defeating {AutoLock}: From Simulation to Real-World Cache-Timing Exploits against {TrustZone}}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/589}, year = {2025}, url = {https://eprint.iacr.org/2025/589} }