Questions tagged [arm]

A family of processor architectures used in many embedded applications, network and other appliances, and almost all smartphones.

ARM is a family of processor architectures especially used in low-power devices. It is commonly found in many embedded applications in consumer and industrial products, in network appliances, in almost all smartphones and tablets, and in some servers.

ARM (the company) designs the instruction set and logical architecture. The physical architecture, as well as companion processors and boot code, is made by system-on-a-chip (SoC) vendors.

Major operating systems for arm include (Windows CE and Windows RT only), , , , , …

27 questions
3
votes
1 answer

Extra features required for TrustZone to provide main security features

The paper Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? describes 5 desired security features for mobile devices: Isolated Execution Secure Storage Remote Attestation Secure Provisioning Trusted…
Oren Milman
  • 149
  • 7
3
votes
1 answer

BOF on ARM Linux - Ret2Libc attempt with system(3) fails due to nullified parameter

In the spirit of gaining a deep understanding, I have read up and worked on some small hacks involving Buffer OverFlow (BOF) attacks, in particular, on an ARM-32 system, via the Ret2Libc style attack. It all works quite well upto a point. The basic…
kaiwan
  • 131
  • 3
2
votes
1 answer

ARM TrustZone with Normal and Secure World

I am new to Security testing and I am working on a 64-bit ARM server. We are using ARM TrustZone technology. Is it possible for me to check if I am in the Secure world or the Normal world? How do I test the above scenario? As a tester assuming I am…
Vinod HC
  • 121
  • 3
2
votes
2 answers

Is it possible to determinate which functions a kernel module calls?

Trusting kernel drivers is bad. Is there something we can do to have at least an idea about what it does? For example, let's suppose an armv8a linux kernel. I'd search for all the syscalls, which according to https://stackoverflow.com/a/12951533,…
Gatonito
  • 121
  • 1
2
votes
1 answer

Is it necessary to understand Linux kernel internals to do binary exploitation?

I am second-year CS student, I know C, OOP concepts, x86 architecture, reverse engineering basics, TCP/IP stack and OS concepts, also I love Linux OS. I have just one question: Is it a mandatory to learn in depth a Linux kernel and develop some…
Asm .
  • 59
  • 5
2
votes
1 answer

using secure boot in embedded systems

The whole idea about using Secure Boot in Embedded Systems to boot an operating system is new to me. I've never paid much attention to it previously. I just know that it prevents the loading at start-up of code which has bad credentials which could…
Engineer999
  • 257
  • 1
  • 8
1
vote
0 answers

Access control for SMC call in TrustZone

What I found so far is that Application requests TA service using qseecom kernel driver. Monitor route that request and TA handles the request in Secure world and return the result.(generated private key). The application get the result(something…
user150497
  • 111
  • 1
1
vote
0 answers

PKI Usage in Trusted Boot

I am trying to understand how PKI is used to boot an ARM board. The following image relates to BL1: The booting steps state: Also from: The certificate used in step 1 appears to be a content certificate. In the diagram it suggests in contains the…
Jake
  • 1,095
  • 3
  • 12
  • 20
1
vote
1 answer

In an Arm TrustZone based Trusted Application (TA), how can a remote party tie an output to a particular TA?

I've been looking at the following figure which shows, with Arm TrustZone architecture, resources of a system can be divided into a Rich Execution Environment (REE) and a Trusted Execution Environment (TEE). Here I'm trying to understand the…
SpiderRico
  • 177
  • 5
0
votes
1 answer

TPM use without secure boot

I've been asked to improve the security of my company's iot device, and encrypt a storage partition. It's a general purpose arm based device, and currently can boot from a variety of sources (USB, network, sd card, etc). The company wants to add a…
Alex
  • 101
  • 2
0
votes
0 answers

Can I prevent thieves from unlocking Android's bootloader?

I know that anything can be exploited. But let's say I want to prevent thieves that do not have access to not openly available exploits, to reset my phone so he can sell. If no openly available exploits exist, then he'd be left with the options of…
Gatonito
  • 121
  • 1
0
votes
1 answer

Android x86 vs Android on Qemu ARM

Situation: Emulating Android devices for pen-testing Problem: Choosing between emulating Android x86 or emulating Android on Qemu runing on ARM Question: In terms of vulnerabilities/exploitability, does Android x86 and Android on Qemu ARM share the…
Timothy Wong
  • 173
  • 8
1
2