參考文獻 |
[1] L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “Iot privacy and security: Challenges and solutions,” Applied Sciences, vol. 10, no. 12, p. 4102, 2020.
[2] Microsoft, “Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed ot devices,” 2024, [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.microsoft.com/en-us/security/blog/2024/05/30/exposed-and-vulnerable-recent-attacks-highlight-critical-need-to-protect-internet-exposed-ot-devices/
[3] “Psa certified 2021 report,” 2021, [Online; accessed 10-Jul-2024]. [Online]. Available: https://report.psacertified.org/?utm_source=Arm&utm_medium=referral&utm_campaign=2021-report
[4] “Confidence to create advisory paper,” 2022, [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.psacertified.org/app/uploads/2022/08/Confidence_to_Create_Advisory_Paper_PSA_Certified-1-compressed.pdf
[5] “A history of iot security,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.psacertified.org/blog/a-history-of-iot-security/
[6] T. Firmware, “Trusted firmware-m introduction,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.trustedfirmware.org/projects/tf-m/
[7] P. Certified, “Introduction to psa certified,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.psacertified.org/
[8] “Tf-m security advisories,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://tf-m-user-guide.trustedfirmware.org/security/security_advisories/index.html
[9] “Generic threat model,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://tf-m-user-guide.trustedfirmware.org/security/threat_models/generic_threat_model.html
[10] A. Machiry, E. Gustafson, C. Spensky, C. Salls, N. Stephens, R. Wang, A. Bianchi, Y. R. Choe, C. Kruegel, and G. Vigna, “Boomerang: Exploiting the semantic gap in trusted execution environments.” in NDSS, 2017.
[11] “Buffer overflow vulnerability in secure processing environment,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://tf-m-user-guide.trustedfirmware.org/security/security_advisories/fwu_write_vulnerability.html
[12] “Omtp advanced trusted environment: Omtp tr1 v1.1,” [Online; accessed 10- Jul-2024]. [Online]. Available: http://www.omtp.org/OMTP_Advanced_Trusted_Environment_OMTP_TR1_v1_1.pdf
[13] Intel, “Intel software guard extensions (sgx),” [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.intel.com/content/www/us/en/architecture-and-technology/software-guard-extensions.html
[14] AMD, “Amd secure encrypted virtualization (sev),” [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.amd.com/en/developer/sev.html
[15] ARM, “Trustzone for cortex-a,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.arm.com/technologies/trustzone-for-cortex-a
[16] ——, “Trustzone for cortex-m,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.arm.com/technologies/trustzone-for-cortex-m
[17] Intel, “Intel sgx developer reference for linux 2.13 open source,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://download.01.org/intel-sgx/sgx-linux/2.13/docs/Intel_SGX_Developer_Reference_Linux_2.13_Open_Source.pdf
[18] “Gpd tee internal core api specification v1.3.1,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://globalplatform.org/wp-content/uploads/2021/03/GPD_TEE_Internal_Core_API_Specification_v1.3.1_PublicRelease_CC.pdf
[19] ARM, “Psa functional api certification for m-profile,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.arm.com/architecture/security-features/platform-security
[20] ——, “Arm cortex-m profile,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.arm.com/en/architecture/cpu/m-profile
[21] S. Labs, “Which arm cortex core is right for your application?” [Online; accessed 10- Jul-2024]. [Online]. Available: https://www.silabs.com/documents/public/white-papers/Which-ARM-Cortex-Core-Is-Right-for-Your-Application.pdf
[22] ARM, “Armv8-m architecture documentation,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://developer.arm.com/documentation/100690/latest/
[23] Wikipedia, “Real-time operating system,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://en.wikipedia.org/wiki/Real-time_operating_system
[24] P. Certified, “Getting certified: Functional api certification,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://www.psacertified.org/getting-certified/functional-api-certification/
[25] ARM, “Armv8-m memory model guide,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://developer.arm.com/documentation/107565/latest/
[26] Wikipedia, “Buffer overflow,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://en.wikipedia.org/wiki/Buffer_overflow
[27] C. Ebert and C. Jones, “Embedded software: Facts, figures, and future,” Computer, vol. 42, no. 4, pp. 42–52, 2009.
[28] N. Hardy, “The confused deputy: (or why capabilities might have been invented),” ACM SIGOPS Operating Systems Review, vol. 22, no. 4, pp. 36–38, 1988.
[29] Z. Ma et al., “Return-to-non-secure vulnerabilities on arm cortex-m trustzone: Attack and defense,” in 2023 60th ACM/IEEE Design Automation Conference (DAC). IEEE, 2023, pp. 1–6.
[30] D. Suciu et al., “Horizontal privilege escalation in trusted applications,” in 29th USENIX Security Symposium (USENIX Security 20), 2020.
[31] ARM, “Cmse support,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://developer.arm.com/documentation/100720/0200/CMSE-support
[32] J. V. Bulck et al., “A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes,” in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp. 1741–1758.
[33] D. Lee et al., “Keystone: An open framework for architecting trusted execution environments,” in Proceedings of the Fifteenth European Conference on Computer Systems, 2020, pp. 1–16.
[34] J. Noorman et al., “Sancus 2.0: A low-cost security architecture for iot devices,” ACM Transactions on Privacy and Security (TOPS), vol. 20, no. 3, pp. 1–33, 2017.
[35] NVD, “Cve-2019-1370,” 2019, [Online; accessed 10-Jul-2024]. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2019-1370
[36] Google, “Asylo: An open and flexible framework for enclave applications,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://github.com/google/asylo/blob/e4810bdbac/asylo/platform/primitives/sgx/trusted_sgx.cc#L98
[37] L. Luo et al., “On runtime software security of trustzone-m based iot devices,” in GLOBECOM 2020-2020 IEEE Global Communications Conference. IEEE, 2020, pp. 1–7.
[38] A. Khurshid et al., “Shield: Shielding cross-zone communication within limited resourced iot devices running vulnerable software stack,” IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 2, pp. 1031–1047, 2022.
[39] A. K. Iannillo et al., “An ree-independent approach to identify callers of tees in trustzone-enabled cortex-m devices,” in Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022, pp. 85–94.
[40] ARM, “Armv8-m exception model guide,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://developer.arm.com/documentation/107706/latest/
[41] Z. Project, “Zephyr and tf-m integration overview,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://docs.zephyrproject.org/latest/services/tfm/overview.html
[42] STMicroelectronics, “Stm32cubel5,” [Online; accessed 10-Jul-2024]. [Online]. Available: https://github.com/STMicroelectronics/STM32CubeL5 |