A Framework for Defending Embedded Systems Against Software Attacks

被引:1
|
作者
Aaraj, Najwa
Raghunathan, Anand [2 ]
Jha, Niraj K. [1 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[2] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
关键词
Security; Design; Performance; Behavioral analysis; embedded systems; instrumentation; malware; multiprocessor systems; software vulnerabilities; ARCHITECTURE;
D O I
10.1145/1952522.1952526
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The incidence of malicious code and software vulnerability exploits on embedded platforms is constantly on the rise. Yet, little effort is being devoted to combating such threats to embedded systems. Moreover, adapting security approaches designed for general-purpose systems generally fails because of the limited processing capabilities of their embedded counterparts. In this work, we evaluate a malware and software vulnerability exploit defense framework for embedded systems. The proposed framework extends our prior work, which defines two isolated execution environments: a testing environment, wherein an untrusted application is first tested using dynamic binary instrumentation (DBI), and a real environment, wherein a program is monitored at runtime using an extracted behavioral model, along with a continuous learning process. We present a suite of software and hardware optimizations to reduce the overheads induced by the defense framework on embedded systems. Software optimizations include the usage of static analysis, complemented with DBI in the testing environment (i.e., a hybrid software analysis approach is used). Hardware optimizations exploit parallel processing capabilities of multiprocessor systems-on-chip. We have evaluated the defense framework and proposed optimizations on the ARM-Linux operating system. Experiments demonstrate that our framework achieves a high coverage of considered security threats, with acceptable performance penalties (the average execution time of applications goes up to 1.68X, considering all optimizations, which is much smaller than the 2.72X performance penalty when no optimizations are used).
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Defending embedded systems against buffer overflow via Hardware/Software
    Shao, Z
    Zhuge, QF
    He, Y
    Sha, EHM
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 352 - 361
  • [2] Defending Embedded Systems with Software Symbiotes
    Cui, Ang
    Stolfo, Salvatore J.
    RECENT ADVANCES IN INTRUSION DETECTION, 2011, 6961 : 358 - 377
  • [3] A Linear Game Framework for Defending Power Systems Against Intelligent Physical Attacks
    Ranjbar, Mohammad Hossein
    Kheradmandi, Morteza
    Pirayesh, Abolfazl
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (06) : 6592 - 6594
  • [4] Defending Distributed Systems Against Adversarial Attacks
    Su L.
    Performance Evaluation Review, 2020, 47 (03): : 24 - 27
  • [5] Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [6] Defending Against Adversarial Attacks in Speaker Verification Systems
    Chang, Li-Chi
    Chen, Zesheng
    Chen, Chao
    Wang, Guoping
    Bi, Zhuming
    2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,
  • [7] A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems
    Tong, Wei
    Zhong, Sheng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2255 - 2267
  • [8] FFRR: a software diversity technique for defending against buffer overflow attacks
    Kisore, N. Raghu
    Kumar, K. Shiva
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (1-2) : 40 - 74
  • [9] PeANFIS-FARM Framework in Defending against Web Service Attacks
    Chan, Gaik-Yee
    Lee, Chien-Sing
    Heng, Swee-Huay
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 108 - 112
  • [10] VeriFace: Defending against Adversarial Attacks in Face Verification Systems
    Sayed, Awny
    Kinlany, Sohair
    Zaki, Alaa
    Mahfouz, Ahmed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (03): : 3151 - 3166