[Resource Topic] 2020/1193: Bypassing Isolated Execution on RISC-V with Fault Injection

Welcome to the resource topic for 2020/1193

Title:
Bypassing Isolated Execution on RISC-V with Fault Injection

Authors: Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma

Abstract:

RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. One of the main objectives of PMP is to provide a trusted execution environment (TEE) that isolates secure and insecure applications. In this study, we propose a fault injection attack to bypass the isolation based on PMP. The proposed attack scheme involves extracting successful glitch parameters for fault injection under the assumption of a black-box environment. We implement a proof-of-concept TEE compatible with PMP in RISC-V, and we verify the feasibility and effectiveness of the proposed attack through some experiments conducted in the TEE. The results show that an attacker can bypass the isolation of the TEE and read data from the protected memory region.

ePrint: https://eprint.iacr.org/2020/1193

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .