{"title":"基于细化的TrustZone多安全分区建模与形式化验证","authors":"Fanlang Zeng, Rui Chang, Hao Xu, Shaoping Pan, Yongwang Zhao","doi":"10.21655/ijsi.1673-7288.00301","DOIUrl":null,"url":null,"abstract":"PDF HTML XML Export Cite reminder Refinement-based Modeling and Formal Verification for Multiple Secure Partitions of TrustZone DOI: 10.21655/ijsi.1673-7288.00301 Author: Affiliation: Clc Number: Fund Project: Article | Figures | Metrics | Reference | Related | Cited by | Materials | Comments Abstract:As a trusted execution environment technology on ARM processors, TrustZone provides an isolated and independent execution environment for security-sensitive programs and data on the device. However, running the trusted OS and all the trusted applications in the same environment may cause problems---The exploitation of vulnerabilities on any component may affect the others in the system. Although ARM proposed the S-EL2 virtualization technology, which supports multiple isolated partitions in the secure world to alleviate this problem, there may still be security threats such as information leakage between partitions in the real-world partition manager. Current secure partition manager designs and implementations lack rigorous mathematical proofs to guarantee the security of isolated partitions. This study analyzes the multiple secure partitions architecture of ARM TrustZone in detail, proposes a refinement-based modeling and security analysis method for multiple secure partitions of TrustZone, and completes the modeling and formal verification of the secure partition manager in the theorem prover Isabelle/HOL. First, we build a multiple secure partitions model named RMTEE based on refinement: an abstract state machine is used to describe the system running process and security policy requirements, forming the abstract model. Then the abstract model is instantiated into the concrete model, in which the event specification is implemented following the FF-A specification. Second, to address the problem that the existing partition manager design cannot meet the goal of information flow security verification, we design a DAC-based inter-partition communication access control and apply it to the modeling and verification of RMTEE. Lastly, we prove the refinement between the concrete model and the abstract model, and the correctness and security of the event specification in the concrete model. The formalization and verification consist of 137 definitions and 201 lemmas (more than 11,000 lines of Isabelle/HOL code). The results show that the model satisfies confidentiality and integrity, and can effectively defend against malicious attacks on partitions. Reference Related Cited by","PeriodicalId":479632,"journal":{"name":"International Journal of Software and Informatics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Refinement-based Modeling and Formal Verification for Multiple Secure Partitions of TrustZone\",\"authors\":\"Fanlang Zeng, Rui Chang, Hao Xu, Shaoping Pan, Yongwang Zhao\",\"doi\":\"10.21655/ijsi.1673-7288.00301\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"PDF HTML XML Export Cite reminder Refinement-based Modeling and Formal Verification for Multiple Secure Partitions of TrustZone DOI: 10.21655/ijsi.1673-7288.00301 Author: Affiliation: Clc Number: Fund Project: Article | Figures | Metrics | Reference | Related | Cited by | Materials | Comments Abstract:As a trusted execution environment technology on ARM processors, TrustZone provides an isolated and independent execution environment for security-sensitive programs and data on the device. However, running the trusted OS and all the trusted applications in the same environment may cause problems---The exploitation of vulnerabilities on any component may affect the others in the system. Although ARM proposed the S-EL2 virtualization technology, which supports multiple isolated partitions in the secure world to alleviate this problem, there may still be security threats such as information leakage between partitions in the real-world partition manager. Current secure partition manager designs and implementations lack rigorous mathematical proofs to guarantee the security of isolated partitions. This study analyzes the multiple secure partitions architecture of ARM TrustZone in detail, proposes a refinement-based modeling and security analysis method for multiple secure partitions of TrustZone, and completes the modeling and formal verification of the secure partition manager in the theorem prover Isabelle/HOL. First, we build a multiple secure partitions model named RMTEE based on refinement: an abstract state machine is used to describe the system running process and security policy requirements, forming the abstract model. Then the abstract model is instantiated into the concrete model, in which the event specification is implemented following the FF-A specification. Second, to address the problem that the existing partition manager design cannot meet the goal of information flow security verification, we design a DAC-based inter-partition communication access control and apply it to the modeling and verification of RMTEE. Lastly, we prove the refinement between the concrete model and the abstract model, and the correctness and security of the event specification in the concrete model. The formalization and verification consist of 137 definitions and 201 lemmas (more than 11,000 lines of Isabelle/HOL code). The results show that the model satisfies confidentiality and integrity, and can effectively defend against malicious attacks on partitions. Reference Related Cited by\",\"PeriodicalId\":479632,\"journal\":{\"name\":\"International Journal of Software and Informatics\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Software and Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21655/ijsi.1673-7288.00301\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Software and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21655/ijsi.1673-7288.00301","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
PDF HTML XML导出引用提示基于细化的TrustZone多安全分区建模与形式化验证DOI: 10.21655/ijsi.1673-7288.00301作者:隶属关系:Clc编号:基金项目:文章|图|指标|参考|相关|引用|资料|评论摘要:TrustZone作为一种基于ARM处理器的可信执行环境技术,为设备上对安全敏感的程序和数据提供了一个隔离独立的执行环境。然而,在同一环境中运行受信任的操作系统和所有受信任的应用程序可能会导致问题——利用任何组件上的漏洞都可能影响系统中的其他组件。虽然ARM提出了S-EL2虚拟化技术,在安全世界中支持多个隔离的分区来缓解这个问题,但是在现实的分区管理器中,仍然可能存在分区间信息泄露等安全威胁。当前的安全分区管理器设计和实现缺乏严格的数学证明来保证隔离分区的安全性。本文详细分析了ARM TrustZone的多安全分区架构,提出了一种基于精细化的TrustZone多安全分区建模和安全分析方法,并在定理证明器Isabelle/HOL中完成了安全分区管理器的建模和形式化验证。首先,我们基于细化构建了一个名为RMTEE的多安全分区模型:使用抽象状态机描述系统运行过程和安全策略需求,形成抽象模型。然后将抽象模型实例化为具体模型,在具体模型中,事件规范按照FF-A规范实现。其次,针对现有分区管理器设计不能满足信息流安全验证目标的问题,设计了一种基于dac的分区间通信访问控制,并将其应用于RMTEE的建模与验证。最后,证明了具体模型与抽象模型之间的细化,以及具体模型中事件规范的正确性和安全性。形式化和验证包括137个定义和201个引理(超过11,000行Isabelle/HOL代码)。结果表明,该模型满足机密性和完整性要求,能够有效防御恶意分区攻击。相关参考文献
Refinement-based Modeling and Formal Verification for Multiple Secure Partitions of TrustZone
PDF HTML XML Export Cite reminder Refinement-based Modeling and Formal Verification for Multiple Secure Partitions of TrustZone DOI: 10.21655/ijsi.1673-7288.00301 Author: Affiliation: Clc Number: Fund Project: Article | Figures | Metrics | Reference | Related | Cited by | Materials | Comments Abstract:As a trusted execution environment technology on ARM processors, TrustZone provides an isolated and independent execution environment for security-sensitive programs and data on the device. However, running the trusted OS and all the trusted applications in the same environment may cause problems---The exploitation of vulnerabilities on any component may affect the others in the system. Although ARM proposed the S-EL2 virtualization technology, which supports multiple isolated partitions in the secure world to alleviate this problem, there may still be security threats such as information leakage between partitions in the real-world partition manager. Current secure partition manager designs and implementations lack rigorous mathematical proofs to guarantee the security of isolated partitions. This study analyzes the multiple secure partitions architecture of ARM TrustZone in detail, proposes a refinement-based modeling and security analysis method for multiple secure partitions of TrustZone, and completes the modeling and formal verification of the secure partition manager in the theorem prover Isabelle/HOL. First, we build a multiple secure partitions model named RMTEE based on refinement: an abstract state machine is used to describe the system running process and security policy requirements, forming the abstract model. Then the abstract model is instantiated into the concrete model, in which the event specification is implemented following the FF-A specification. Second, to address the problem that the existing partition manager design cannot meet the goal of information flow security verification, we design a DAC-based inter-partition communication access control and apply it to the modeling and verification of RMTEE. Lastly, we prove the refinement between the concrete model and the abstract model, and the correctness and security of the event specification in the concrete model. The formalization and verification consist of 137 definitions and 201 lemmas (more than 11,000 lines of Isabelle/HOL code). The results show that the model satisfies confidentiality and integrity, and can effectively defend against malicious attacks on partitions. Reference Related Cited by