Abstract :
TrustZone technology provides a defense against malicious software attempting to tamper with critical data such as digital-rights management (DRM) counters. The basic premise of our solution is that the state of the flash can serve as a point of reference to detect when rollback has occurred. Our solution is embodied in a trusted software application that needs the protection provided by the TrustZone Secure World. This application represents the flash´s state by generating a hash over a 32-byte sample of contiguous flash content, starting at a randomly selected address. The reference hash of the critical data is retrieved by decrypting the stored items just described and reversing the process. Next, the critical data itself is decrypted, and a new hash is generated from it. The new hash is compared with the reference hash to determine the critical data´s integrity.
Keywords :
cryptography; data integrity; flash memories; synchronisation; TrustZone technology; cryptography; data integrity; decryption; flash memory; hash function; malicious software; Application software; Counting circuits; Cryptography; Data security; Embedded computing; Flash memory; Information retrieval; Protection; Technology management; Testing; DRM counters; TrustZone technology; rollback attack; secure execution environment; trusted software application;