Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis

C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …

Teezz: Fuzzing trusted applications on cots android devices

M Busch, A Machiry, C Spensky… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Security and privacy-sensitive smartphone applications use trusted execution environments
(TEEs) to protect sensitive operations from malicious code. By design, TEEs have privileged …

Systematic Literature Review of EM-SCA Attacks on Encryption

MR Zunaidi, A Sayakkara, M Scanlon - arXiv preprint arXiv:2402.10030, 2024 - arxiv.org
Cryptography is vital for data security, but cryptographic algorithms can still be vulnerable to
side-channel attacks (SCAs), physical assaults exploiting power consumption and EM …

Formal verification of memory isolation for the trustzone-based tee

Y Ma, Q Zhang, S Zhao, G Wang, X Li… - 2020 27th Asia-Pacific …, 2020 - ieeexplore.ieee.org
The trusted execution environment (TEE) is the security basis of embedded systems, which
can provide a hardware-based isolated execution environment for security-sensitive …

Methodology for forensics data reconstruction on mobile devices with Android operating system applying in-system programming and combination firmware

CM da Silveira, R T. de Sousa Jr… - Applied Sciences, 2020 - mdpi.com
This paper proposes a new forensic analysis methodology that combines processes,
techniques, and tools for physical and logical data acquisition from mobile devices. The …

Cross-world covert channel on arm trustzone through pmu

X Li, A Tyagi - Sensors, 2022 - mdpi.com
The TrustZone technology is incorporated in a majority of recent ARM Cortex A and Cortex
M processors widely deployed in the IoT world. Security critical code execution inside a so …

Automated Detection of Cryptographic Inconsistencies in Android's Keymaster Implementations

A Imran, A Bianchi - Proceedings of the 22nd Annual International …, 2024 - dl.acm.org
Android smartphones use a dedicated component, Keymaster, to perform all their
cryptographic, security-sensitive operations (eg, storing cryptographic material and …

Deployment Issues, Attacks, and Other Challenges

C Shepherd, K Markantonakis - Trusted Execution Environments, 2024 - Springer
The deployment of TEEs has been fragmented and turbulent, raising significant concerns
about their trust, compatibility, and resilience. Among these challenges, the closed-source …

[PDF][PDF] Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones

MBPMM Payer - nebelwelt.net
The number and complexity of Trusted Applications (TAs, applications running in Trusted
Execution Environments—TEEs) deployed on mobile devices has exploded. A vulnerability …

[PDF][PDF] Vulnerabilities Analysis and Attack Scenarios Description

R Holloway - exfiles.eu
EXFILES D5.1 Vulnerabilities analysis and attack scenarios description, PU, M06 Page 1 D5.1
Vulnerabilities Analysis and Attack Scenarios Description Project number: 883156 Project …