EL3XIR: fuzzing COTS secure monitors
ARM TrustZone forms the security backbone of mobile devices. TrustZone-based Trusted Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication, disk encryption, and digital rights management (DRM). As such, bugs in the TEE software stack may compromise the entire system's integrity. EL3XIR introduces a framework to effectively rehost and fuzz the secure monitor firmware layer of proprietary TrustZone-based TEEs. While other approaches have focused on naively rehosting or fuzzing Trusted Applications (EL0) or the TEE OS (EL1), EL3XIR targets the highly-privileged but unexplored secure monitor (EL3) and its unique challenges. Secure monitors expose complex functionality dependent on multiple peripherals through diverse secure monitor calls. In our evaluation, we demonstrate that state-of-the-art fuzzing approaches are insufficient to effectively fuzz COTS secure monitors. While naive fuzzing appears to achieve reasonable coverage it fails to overcome coverage walls due to missing peripheral emulation and is limited in the capability to trigger bugs due to the large input space and low quality of inputs. We followed responsible disclosure procedures and reported a total of 34 bugs, out of which 17 were classified as security critical. Affected vendors confirmed 14 of these bugs, and as a result, EL3XIR was assigned six CVEs.
2024
Berkeley, CA, United States
978-1-939133-44-1
302
5395
5412
REVIEWED
EPFL
Event name | Event acronym | Event place | Event date |
SEC '24 | Philadelphia, PA, USA | 2024-08-14 | |
Funder | Funding(s) | Grant Number | Grant URL |
European Research Council | |||
European Union | Horizon 2020 research and innovation program ( | 850868 | |
Swiss National Science Foundation | Software Security through Multi-dimensional, Input-guided Sanitization | 186974 | |