Home / Series / Chaos Communication Congress / Aired Order / Season 34 / Episode 41

Microarchitectural Attacks on Trusted Execution Environments

Speaker: Keegan Ryan Trusted Execution Environments (TEEs), like those based on ARM TrustZone or Intel SGX, intend to provide a secure way to run code beyond the typical reach of a computer’s operating system. However, when trusted and untrusted code runs on shared hardware, it opens the door to the same microarchitectural attacks that have been exploited for years. This talk provides an overview of these attacks as they have been applied to TEEs, and it additionally demonstrates how to mount these attacks on common TrustZone implementations. Finally, we identify new techniques which allow us to peer within TrustZone TEEs with greater resolution than ever before.

English
  • Originally Aired December 27, 2017
  • Runtime 60 minutes
  • Production Code 8950
  • Created December 27, 2017 by
    Administrator admin
  • Modified December 27, 2017 by
    Administrator admin