UnTrustZone: Systematic Accelerated Aging to Expose On-chip Secrets
Jubayer Mahmod, Matthew Hicks
IEEE Symposium on Security and Privacy 2024 · Day 3 · Continental Ballroom 5
The talk "UnTrustZone: Systematic Accelerated Aging to Expose On-chip Secrets" by Jubayer Mahmod and Matthew Hicks from Virginia Tech introduces a groundbreaking physical attack methodology that systematically exploits transistor aging in **SRAM** (Static Random-Access Memory) to bypass hardware-backed security mechanisms like **ARM TrustZone**. This research demonstrates how secrets stored in on-chip memory, even after architectural erasure or isolation, can be exfiltrated by accelerating the physical aging process of memory cells. The ubiquity of ARM-based devices, from small sensors to desktop computers, underscores the critical importance of this vulnerability, challenging fundamental assumptions about the permanence of data erasure and the effectiveness of current hardware isolation techniques against sophisticated physical adversaries.
AI review
This research introduces a groundbreaking physical attack, UnTrustZone, that leverages systematic accelerated transistor aging in SRAM to bypass hardware-backed security like ARM TrustZone. It demonstrates that on-chip secrets, even after architectural erasure, can be exfiltrated with high accuracy by manipulating the physical properties of memory cells, fundamentally challenging current hardware security assumptions.