FPGA-SoCs are heterogeneous computing systems consisting of
reconfigurable hardware and high performance processing units.
This combination enables a flexible design methodology for embedded
systems. However, the sharing of resources between these heterogeneous systems opens the door to attacks from one system
on the other. This work considers Direct Memory Access attacks
from a malicious hardware block inside the reconfigurable logic on
the CPU. Previous works have shown similar attacks on FPGA-SoCs
containing no memory isolation between the FPGA and the CPU.
Our work studies the same idea on a system based on the Xilinx
Zynq Ultrascale+ architecture. This platform contains memory isolation
mechanisms such as a system memory management unit,
memory protection units and supports ARM TrustZone technology.
Despite the existence of these protection mechanisms, the two attacks
presented in this work show that a malicious hardware block
can still interfere with a security critical task executed on the CPU
inside ARM TrustZone.
«
FPGA-SoCs are heterogeneous computing systems consisting of
reconfigurable hardware and high performance processing units.
This combination enables a flexible design methodology for embedded
systems. However, the sharing of resources between these heterogeneous systems opens the door to attacks from one system
on the other. This work considers Direct Memory Access attacks
from a malicious hardware block inside the reconfigurable logic on
the CPU. Previous works have shown similar attacks o...
»