Interface Diversification in IoT Operating Systems

被引:0
作者
Maki, Petteri [1 ]
Rauti, Sampsa [1 ]
Hosseinzadeh, Shohreh [1 ]
Koivunen, Lauri [1 ]
Leppanen, Ville [1 ]
机构
[1] Univ Turku, Dept IT, Turku, Finland
来源
2016 IEEE/ACM 9TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC) | 2016年
关键词
software security; diversification; IoT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of Internet in Things (IoT) more and more "things" are connected to each other through the Internet. Due to the fact that the collected information may contain personal information of the users, it is very important to ensure the security of the devices in IoT. Diversification is a promising technique that protects the software and devices from harmful attacks and malware by making interfaces unique in each separate system. In this paper we apply diversification on the interfaces of IoT operating systems. To this aim, we introduce the diversification in post-compilation and linking phase of the software life-cycle, by shuffling the order of the linked objects while preserving the semantics of the code. This approach successfully prevents malicious exploits from producing adverse effects in the system. Besides shuffling, we also apply library symbol diversification method, and construct needed support for it e.g. into the dynamic loading phase. Besides studying and discussing memory layout shuffling and symbol diversification as a security measures for IoT operating systems, we provide practical implementations for these schemes for Thingsee OS and Raspbian operating systems and test these solutions to show the feasibility of diversification in IoT environments.
引用
收藏
页码:304 / 309
页数:6
相关论文
共 18 条
  • [1] On Protection by Layout Randomization
    Abadi, Martin
    Plotkin, Gordon D.
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (02)
  • [2] [Anonymous], 1997, 148 U AUCKL
  • [3] Bhatkar S, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P105
  • [4] Cohen F. B., 1993, Computers & Security, V12, P565, DOI 10.1016/0167-4048(93)90054-9
  • [5] Franz Michael., 2010, Proceedings of the 2010 Workshop on New Security Paradigms, NSPW '10, P7
  • [6] Gartner, GARTN SAYS 6 4 BILL
  • [7] Hosseini SA, 2015, COMP COMM SEC ICCCS, P1, DOI DOI 10.1177/1464420715588218
  • [8] Hosseinzadeh S., 2016, Internet of Things Principles and Paradigms, P259
  • [9] Hosseinzadeh S., 2016, INT C COMP SYST TECH, P8
  • [10] HSP: A solution against heap sprays
    Hsu, Fu-Hau
    Huang, Cheng-Hsien
    Hsu, Chi-Hsien
    Ou, Chih-Wen
    Chen, Li-Han
    Chiu, Ping-Cheng
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (11) : 2227 - 2236