參考文獻 |
[1] ARM, Arm TrustZone Technology, 2008. [Online]. Available: https://developer.
arm.com/ip-products/security-ip/trustzone
[2] Microsoft, 70 percent of all security bugs are memory safety issues, 2019.
[Online]. Available: https://www.zdnet.com/article/microsoft-70-percent-of-allsecurity-bugs-are-memory-safety-issues/
[3] Kostya Serebryany, AddressSanitizerUseAfterReturn, 2018. [Online]. Available:
https://github.com/google/sanitizers/wiki/AddressSanitizerUseAfterReturn
[4] M. Prasad and T. Chiueh, “A binary rewriting defense against stack based buffer
overflow attacks,” USENIX Security, 2003.
[5] Arm, Arm A-Profile Architecture Developments 2018: Armv8.5-A, 2018. [Online]. Available: https://community.arm.com/developer/ip-products/processors/b/
processors-ip-blog/posts/arm-a-profile-architecture-2018-developments-armv85a
[6] M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, “Control-flow integrity principles,
implementations, and applications,” ACM Transactions on Information and System
Security, vol. 13, pp. 1–40, 2009.
[7] H. Hu, C. Qian, C. Yagemann, S. Chung, W. Harris, T. Kim, and W. Lee, “Enforcing
unique code target property for control-flow integrity,” ACM SIGSAC Conference
on Computer and Communications Security, 2018.
[8] B. Niu and G. Tan, “Modular control-flow integrity,” ACM SIGPLAN Conference on
Programming Language Design and Implementation, 2014.
[9] B. Niu and G. Tan, “Per-input control-flow integrity,” ACM SIGSAC Conference on
Computer and Communications Security, 2015.
[10] M. Khandaker, W. Liu, A. Naser, Z. Wang, and J. Yang, “Origin-sensitive control
flow integrity,” USENIX Security, 2019.
[11] M. Khandaker, W. Liu, A. Naser, Z. Wang, and Y. Cheng, “Adaptive call-site sensitive control flow integrity,” IEEE European Symposium on Security and Privacy,
2019.
[12] V. Lionel Sambuc, D. Asia Slowinska, E. Herbert Bos, and B. Cristiano Giuffrida,
“Practical context-sensitive cfi,” ACM SIGSAC Conference on Computer and Communications Security, 2015.
[13] K. Donghyun, S. Jiwon, C. Yeongpil, L. Byoungyoung, and P. Yunheung, “Pros:
Light-weight privatized se cure oses in arm trustzone,” IEEE Transactions on Mobile
Computing, vol. 19, no. 6, pp. 1434–1447, 2020.
[14] J. Jinsoo, C. Changho, L. Jaehyuk, K. Nohyun, L. Seongman, C. Yeseul, and K. Brent
Byunghoon, “Privatezone: Providing a private execution environment using arm
trustzone,” IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 5,
pp. 797–810, 2018.
[15] Wikipedia, Hyperjacking, 2015. [Online]. Available: https://en.wikipedia.org/wiki/
Hyperjacking
[16] F. Brasser, D. Gens, P. Jauernig, A. Sadeghi, and E. Stapf, “Sanctuary: Arming trustzone with user-space enclaves,” Network and Distributed Systems Security (NDSS)
Symposium, 2019.
[17] J. Reardon, A. Feal, P. Wijesekera, A. Elazari Bar On, N. Vallina-Rodriguez, and
S. Egelman, “50 ways to leak your data: An exploration of apps’ circumvention of
the android permissions system,” USENIX Security, 2019.
[18] Common Vulnerabilities and Exposures, CVE in Android, 2020. [Online]. Available:
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Android
[19] CVE Details, Google’s Android Vulnerability Statistics, 2020. [Online]. Available:
https://www.cvedetails.com/product/19997/Google-Android.html?vendor_id=1224
[20] CVE Details, Linux Kernel Vulnerability Statistics, 2020. [Online]. Available:
https://www.cvedetails.com/product/47/Linux-Linux-Kernel.html?vendor_id=33
[21] OMTP.org, OMTP Advanced Trusted Environment OMTP TR1 v1.1, 2020. [Online]. Available: http://www.omtp.org/OMTP_Advanced_Trusted_Environment_
OMTP_TR1_v1_1.pdf
[22] GlobalPlatform.org, 2020. [Online]. Available: https://globalplatform.org/
[23] GlobalPlatform, TEE System Architecture v1.2, 2018. [Online]. Available: https:
//globalplatform.org/specs-library/tee-system-architecture-v1-2/
[24] GlobalPlatform, TEE Client API Specification v1.0, 2010. [Online]. Available:
https://globalplatform.org/specs-library/tee-client-api-specification/
[25] GlobalPlatform, TEE Internal Core API Specification v1.2.1, 2019. [Online]. Available: https://globalplatform.org/specs-library/tee-internal-core-api-specificationv1-2/
[26] Arm, ARM CoreLink TZC-400 TrustZone Address Space Controller, 2013. [Online].
Available: https://developer.arm.com/documentation/ddi0504/c/
[27] Wikipedia, C standard library, 2015. [Online]. Available: https://en.wikipedia.org/
wiki/C_standard_library
[28] Kellep Charles, Mitigating Buffer Overflow Attacks in Linux/Unix, 2018.
[Online]. Available: https://securityboulevard.com/2018/11/mitigating-bufferoverflow-attacks-in-linux-unix
[29] Wikipedia, Stack buffer overflow, 2018. [Online]. Available: https://en.wikipedia.
org/wiki/Stack_buffer_overflow
[30] Wikipedia, Bounds checking, 2012. [Online]. Available: https://en.wikipedia.org/
wiki/Bounds_checking
[31] Linaro, TA Header. [Online]. Available: https://github.com/OP-TEE/optee_os/blob/
master/ta/arch/arm/user_ta_header.c
[32] G.Beniamini, Trust issues: Exploiting trustzone tees., 2017. [Online].
Available: https://googleprojectzero.blogspot.com/2017/07/trust-issues-exploitingtrustzone-tees.html
[33] Linaro, TSK. [Online]. Available: https://github.com/OP-TEE/optee_os/blob/
master/core/tee/tee_fs_key_manager.c
[34] Linaro, Open Portable Trusted Execution Environment, 2013. [Online]. Available:
https://www.op-tee.org/
[35] ARM-software, arm-trusted-firmware, 2020. [Online]. Available: https://github.
com/ARM-software/arm-trusted-firmware
[36] stackoverflow.com, cache attributes in MMU page table in arm linux. [Online]. Available: https://stackoverflow.com/questions/27908172/cache-attributesin-mmu-page-table-in-arm-linux
[37] Wikipedia, HMAC-based one-time password, 2020. [Online]. Available: https:
//en.wikipedia.org/wiki/HMAC-based_one-time_password
[38] Patrick Delaunay, stm32mp: update MMU config before the relocation, 2021. [Online]. Available: http://patchwork.ozlabs.org/project/uboot/patch/20210205135332.
1.Id05ed63c4c424d0307d757026ab2f22621b5481b@changeid/
[39] Patrick Delaunay, don’t map reserved region with no-map property, 2021. [Online].
Available: http://patchwork.ozlabs.org/project/uboot/list/?series=228543&state=* |