TCG Runtime Integrity Preservation in Mobile Devices
TCG Runtime Integrity Preservation in Mobile Devices | Family “2.0” | Level 00 Revision 106 | 11/11/2019 Page 3 © TCG 2019
TABLE OF CONTENTS
TABLE OF CONTENTS ................................................................................................................................................. 3
1 INTRODUCTION .................................................................................................................................................... 4
1.1 Scope and Audience ....................................................................................................................................... 4
1.2 Informative References ................................................................................................................................... 4
1.3 Definitions ....................................................................................................................................................... 6
2 RUNTIME INTEGRITY PRESERVATION CONCEPTS ........................................................................................ 7
2.1 Mobile Device Integrity Goals ......................................................................................................................... 7
2.1.1 Integrity of Reference Measurements ................................................................................................... 7
2.1.2 Identity of Protected Objects ................................................................................................................. 7
2.1.3 Freshness of Integrity Assessment ....................................................................................................... 7
2.2 Mobile Device Integrity Preservation .............................................................................................................. 8
2.2.1 Pre-boot Integrity ................................................................................................................................... 8
2.2.2 Boot-time Integrity ................................................................................................................................. 8
2.2.3 Load-time Integrity ................................................................................................................................. 8
2.2.4 Run-time Integrity .................................................................................................................................. 8
3 RUNTIME INTEGRITY PRESERVATION (RIP) MECHANISMS .......................................................................... 9
3.1 Static Integrity Mechanisms ............................................................................................................................ 9
3.1.1 Static Integrity Enforcement .................................................................................................................. 9
3.1.2 Integrity Assessment ........................................................................................................................... 10
3.1.3 Integrity Remediation ........................................................................................................................... 11
3.2 Dynamic Integrity Mechanisms ..................................................................................................................... 12
3.2.1 Control Flow Integrity ........................................................................................................................... 12
3.2.2 Data Flow Integrity ............................................................................................................................... 13
3.2.3 Memory Corruption Prevention ........................................................................................................... 13
4 RUNTIME INTEGRITY PRESERVATION RECOMMENDATIONS ..................................................................... 14
4.1 Recommendations for RIP Security Policy ................................................................................................... 14
4.2 Recommendations for Pre-boot Integrity ...................................................................................................... 14
4.3 Recommendations for Runtime Integrity Enforcement ................................................................................ 14
4.4 Recommendations for Runtime Integrity Assessment ................................................................................. 15
4.5 Recommendations for Runtime Integrity Remediation ................................................................................. 16
4.6 Recommendations for Control Flow Integrity Preservation .......................................................................... 16
4.7 Recommendations for Data Flow Integrity Preservation .............................................................................. 16
5 PERFORMANCE OF RIP MECHANISMS ........................................................................................................... 17
5.1 Dedicated RIP Hardware .............................................................................................................................. 17