A Framework for Defending Embedded Systems Against Software Attacks

被引:1
作者
Aaraj, Najwa
Raghunathan, Anand [2 ]
Jha, Niraj K. [1 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[2] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
关键词
Security; Design; Performance; Behavioral analysis; embedded systems; instrumentation; malware; multiprocessor systems; software vulnerabilities; ARCHITECTURE;
D O I
10.1145/1952522.1952526
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The incidence of malicious code and software vulnerability exploits on embedded platforms is constantly on the rise. Yet, little effort is being devoted to combating such threats to embedded systems. Moreover, adapting security approaches designed for general-purpose systems generally fails because of the limited processing capabilities of their embedded counterparts. In this work, we evaluate a malware and software vulnerability exploit defense framework for embedded systems. The proposed framework extends our prior work, which defines two isolated execution environments: a testing environment, wherein an untrusted application is first tested using dynamic binary instrumentation (DBI), and a real environment, wherein a program is monitored at runtime using an extracted behavioral model, along with a continuous learning process. We present a suite of software and hardware optimizations to reduce the overheads induced by the defense framework on embedded systems. Software optimizations include the usage of static analysis, complemented with DBI in the testing environment (i.e., a hybrid software analysis approach is used). Hardware optimizations exploit parallel processing capabilities of multiprocessor systems-on-chip. We have evaluated the defense framework and proposed optimizations on the ARM-Linux operating system. Experiments demonstrate that our framework achieves a high coverage of considered security threats, with acceptable performance penalties (the average execution time of applications goes up to 1.68X, considering all optimizations, which is much smaller than the 2.72X performance penalty when no optimizations are used).
引用
收藏
页数:23
相关论文
共 50 条
[1]   Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems [J].
Dua, Akshay ;
Bulusu, Nirupama ;
Feng, Wu-Chang ;
Hu, Wen .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2014, 13
[2]   Defending Distributed Systems Against Adversarial Attacks [J].
Su L. .
Performance Evaluation Review, 2020, 47 (03) :24-27
[3]   A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems [J].
Tong, Wei ;
Zhong, Sheng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) :2255-2267
[4]   FFRR: a software diversity technique for defending against buffer overflow attacks [J].
Kisore, N. Raghu ;
Kumar, K. Shiva .
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (1-2) :40-74
[5]   Defending medical information systems against malicious software [J].
Gobuty, DE .
CARS 2004: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2004, 1268 :96-107
[6]   Defending AUTOSAR Safety Critical Systems Against Code Reuse Attacks [J].
Nasser, Ahmad ;
Ma, Di .
PROCEEDINGS OF THE ACM WORKSHOP ON AUTOMOTIVE CYBERSECURITY (AUTOSEC '19), 2019, :15-18
[7]   Framework for Software Tampering Detection in Embedded Systems [J].
Al-Wosabi, Abdo Ali Abdullah ;
Shukur, Zarina ;
Ibrahim, Muhammad Azwan .
5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS 2015, 2015, :259-264
[8]   SybilGuard: Defending against sybil attacks via social networks [J].
Yu, Haifeng ;
Kaminsky, Michael ;
Gibbons, Phillip B. ;
Flaxman, Abraham .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) :267-278
[9]   Towards Defending Connected Vehicles Against Attacks [J].
AbdAllah, Eslam G. ;
Zulkernine, Mohammad ;
Gu, Yuan Xiang ;
Liem, Clifford .
PROCEEDINGS OF THE FIFTH EUROPEAN CONFERENCE ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS (ECBS 2017), 2017,
[10]   Code Mutation as a mean against ROP Attacks for Embedded Systems [J].
Tabatt, P. ;
Jelonek, J. ;
Schoelzel, M. ;
Lehniger, K. ;
Langendoerfer, P. .
2022 11TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2022, :189-192