Paper 2025/589

Defeating AutoLock: From Simulation to Real-World Cache-Timing Exploits against TrustZone

Quentin Forcioli, Télécom ParisTech
Sumanta Chaudhuri, Télécom ParisTech
Jean-Luc Danger, Télécom ParisTech
Abstract

In this article, we present for the first time a cross-core Prime+Probe attack on ARM TrustZone, which bypasses the AutoLock mechanism. We introduce our simulation- driven methodology based on gem5 for vulnerability analysis. We demonstrate its utility in reverse engineering a SoC platform in order to study its microarchitectural behavior (caches, etc.), inside a simulator, in spite of hardware protection. We present a novel vulnerability analysis technique, which takes into account the cache set occupancy for targeted victim executable. This proves to be essential in identifying information leakage in presence of AutoLock. The above tool also identifies the cache lines leaking a maximum amount of information. A cross-core Prime+Probe attack is then mounted on these max-leakage cache lines both in simulation for fine-tuning, and in real hardware. We validate our analysis and attack method on OP-TEE, an open-source trusted execution environment running on RockPi4 a board based on RK3399 SoC. More specifically we target the RSA subroutine in the MbedTLS library used inside OP-TEE. Despite the presence of AutoLock, multiplier obfuscation, and assuming a cross-core attack, we are able to retrieve 30% of the key bits, which can later be used in Branch-and-Prune methods to recover the full key.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
SoCgem5SecurityVirtual PlatformPenetration TestingTEEMicro-Architectural AttacksReverse Engineering
Contact author(s)
quentin forcioli @ telecom-paris fr
sumanta chaudhuri @ telecom-paris fr
jean-luc danger @ telecom-paris fr
History
2025-04-04: approved
2025-04-01: received
See all versions
Short URL
https://ia.cr/2025/589
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/589,
      author = {Quentin Forcioli and Sumanta Chaudhuri and Jean-Luc Danger},
      title = {Defeating {AutoLock}: From Simulation to Real-World Cache-Timing Exploits against {TrustZone}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/589},
      year = {2025},
      url = {https://eprint.iacr.org/2025/589}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.