Linked by Thom Holwerda on Thu 10th Apr 2014 20:05 UTC, submitted by nfeske
Hardware, Embedded Systems

Behind the term TrustZone lies a security technology that is almost omnipresent in ARM-based devices, ranging from low-cost development boards to most mobile phones. Yet, there hardly exists a public body of knowledge around it. This prompted the Genode developers to investigate. Today, they published their findings in the form of a comprehensive article and an demonstration video.

In contrast to TPMs, which were designed as fixed-function devices with a predefined feature set, TrustZone represented a much more flexible approach by leveraging the CPU as a freely programmable trusted platform module. To do that, ARM introduced a special CPU mode called "secure mode" in addition to the regular normal mode, thereby establishing the notions of a "secure world" and a "normal world". The distinction between both worlds is completely orthogonal to the normal ring protection between user-level and kernel-level code and hidden from the operating system running in the normal world. Furthermore, it is not limited to the CPU but propagated over the system bus to peripheral devices and memory controllers. This way, ARM-based platforms become effectively kind of a split personality. When secure mode is active, the software running on the CPU has a different view on the whole system than software running in non-secure mode.

The Genode team is nothing short of amazing. Not only are they developing unique software, they're also doing stuff like this. Much respect for these women and men.

Thread beginning with comment 586886
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[2]: tempting?
by WereCatf on Fri 11th Apr 2014 04:03 UTC in reply to "RE: tempting?"
WereCatf
Member since:
2006-02-15

It is a privacy nightmare lying in wait.


It's funny how you see a privacy nightmare and I see very interesting technology that could be used e.g. for researching some of the higher-end malware and bots. Of course, I'm not saying it couldn't be used for the things you fear, but that's not what I first think of when reading about this stuff.

Reply Parent Score: 2

RE[3]: tempting?
by Alfman on Fri 11th Apr 2014 06:42 in reply to "RE[2]: tempting?"
Alfman Member since:
2011-01-28

WereCatf,

Of course, I'm not saying it couldn't be used for the things you fear, but that's not what I first think of when reading about this stuff.


Of course there would be some cool applications, but honestly my first thought was DRM, such that the owner only has control over the "normal world" portion, while someone else controls the "secure world" in order to impose content restrictions.

Reply Parent Score: 4

RE[4]: tempting?
by WereCatf on Fri 11th Apr 2014 06:45 in reply to "RE[3]: tempting?"
WereCatf Member since:
2006-02-15

That's what I was saying; we have so different kinds of first reactions to something like this and I found it rather funny.

Reply Parent Score: 2

RE[3]: tempting?
by przemo_li on Fri 11th Apr 2014 08:16 in reply to "RE[2]: tempting?"
przemo_li Member since:
2010-06-01

Funny thing to assume that it will not be used by malware in the first place...

Want such solution? DIY, and not put it in every computer out there for really bad people to use.

Reply Parent Score: 2