Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight

Journal Article · · Journal of Hardware and Systems Security
Abstract

Trusted execution environments (TEE) are deployed on many platforms to provide both confidentiality and integrity, and their extensive use offers a secure environment for privacy-sensitive operations. Despite TEE prevalence in the smartphone and tablet market, vulnerability research into TEE security is relatively rare. This is, in part, due to the strong isolation guarantees provided by its implementation. In this paper, we propose a hardware assisted fuzzing framework, CROWBAR, that bypasses TEE isolation to natively evaluate trusted applications (TAs) on mobile devices by leveraging ARM CoreSight components. CROWBAR performs feedback-driven fuzzing on commercial, closed source TAs while running in a TEE protected environment. We implement CROWBAR on 2 prototype commercial-off-the-shelf (COTS) smartphones and one development board, finding 3 unique crashes in 5 closed source TAs that are previously unreported in the TrustZone fuzzing literature.

Sponsoring Organization:
USDOE
Grant/Contract Number:
SC0018430
OSTI ID:
1985308
Journal Information:
Journal of Hardware and Systems Security, Journal Name: Journal of Hardware and Systems Security Journal Issue: 2-3 Vol. 7; ISSN 2509-3428
Publisher:
Springer Science + Business MediaCopyright Statement
Country of Publication:
Country unknown/Code not available
Language:
English

References (5)

Understanding the Security of ARM Debugging Features conference May 2019
Fuzzing: State of the Art journal September 2018
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
  • Costin, Andrei; Zarras, Apostolis; Francillon, AurĂ©lien
  • ASIA CCS '16: ACM Asia Conference on Computer and Communications Security, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security https://doi.org/10.1145/2897845.2897900
conference May 2016
Demystifying Arm TrustZone journal November 2019
SoK: Enabling Security Analyses of Embedded Systems via Rehosting conference May 2021

Similar Records

Hardware Fuzzing with An Emulator
Technical Report · Sun Sep 01 00:00:00 EDT 2024 · OSTI ID:2480163

Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments
Technical Report · Sun Oct 25 00:00:00 EDT 2020 · OSTI ID:1768054

Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
Journal Article · Wed Jul 14 20:00:00 EDT 2021 · Journal of Systems Architecture · OSTI ID:1977682

Related Subjects