CacheKit: Evading memory introspection using cache incoherence

N Zhang, H Sun, K Sun, W Lou… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 2016ieeexplore.ieee.org
With the growing importance of networked embedded devices in the upcoming Internet of
Things, new attacks targeting embedded OSes are emerging. ARM processors, which power
over 60% of embedded devices, introduce a hardware security extension called TrustZone
to protect secure applications in an isolated secure world that cannot be manipulated by a
compromised OS in the normal world. LeveragingTrustZone technology, a number of
memory integrity checking schemes have been proposed in the secure world to introspect …
With the growing importance of networked embedded devices in the upcoming Internet of Things, new attacks targeting embedded OSes are emerging. ARM processors, which power over 60% of embedded devices, introduce a hardware security extension called TrustZone to protect secure applications in an isolated secure world that cannot be manipulated by a compromised OS in the normal world. LeveragingTrustZone technology, a number of memory integrity checking schemes have been proposed in the secure world to introspect malicious memory modification of the normal world. In this paper, we first discover and verify an ARM TrustZone cache incoherence behavior, which results in the cache contents of the two worlds, secure and non-secure, potentially being different even when they are mapped to the same physical address. Furthermore, code in one TrustZone world cannot access the cache content in the other world. Based on this observation, we develop a new rootkit called CacheKit that hides in the cache of the normal world and is able to evade memory introspection from the secure world. We implement a CacheKit prototype on Cortex-A8 processors after solving a number of challenges. First, we employ the Cache-as-RAM technique to ensure that the malicious code is only loaded into the CPU cache and not RAM. Thus, the secure world cannot detect the existence of the malicious code by examining the RAM. Second, we use the ARM processor's hardware support on cache settings to keep the malicious code persistent in the cache. Third, to evade introspection that flushes cache content back into RAM, we utilize physical addresses from the I/O address range that is not backed by any real I/O devices or RAM. The experimental results show that CacheKit can successfully evade memory introspection from the secure world and has small performance impacts on the rich OS. We discuss potential countermeasures to detect this type of rootkit attack.
ieeexplore.ieee.org
Showing the best result for this search. See all results