首页 > 最新文献

Workshop on Trustworthy Embedded Devices最新文献

英文 中文
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks 可怕的记忆:对代码重用攻击的实用防御的探索
Pub Date : 2014-11-03 DOI: 10.1145/2666141.2668386
A. Sadeghi, Lucas Davi
Code reuse attacks such as return-oriented programming (ROP) are predominant attack techniques that are extensively used to exploit vulnerabilities in modern software programs. ROP maliciously combines short instruction sequences (gadgets) residing in shared libraries and the application's executable to bypass data execution prevention (DEP) and launch targeted exploits. ROP attacks apply to many processor architectures from Intel x86 [1] to tiny embedded systems [2]. As a consequence, a variety of defenses have been proposed over the last few years - most prominently code randomization (ASLR) and control-flow integrity (CFI). Particularly, constructing practical CFI schemes has become a hot topic of research recently. In this talk, we present the evolution of return-oriented programming (ROP) attacks and defenses. We first give an overview of ROP attacks and techniques. Second, we investigate the security of software diversity based approaches such as finegrained code randomization [3]. Third, we dive deeper and focus on control-flow integrity (CFI) and show how to bypass all recent (coarse-grained) CFI solutions, including Microsoft's defense tool EMET [4]. Finally, we discuss new research directions to mitigate code reuse attacks, including our current work on hardware-assisted fine-grained control-flow integrity [5]. Part of this research [3-5] was conducted in collaboration with A. Dmitrienko, D. Lehmann, C. Liebchen, P. Koeberl, F. Monrose, and K. Z. Snow
代码重用攻击,如面向返回的编程(ROP)是主要的攻击技术,广泛用于利用现代软件程序中的漏洞。ROP恶意地将驻留在共享库中的短指令序列(小工具)与应用程序的可执行文件结合起来,以绕过数据执行预防(DEP)并启动目标漏洞利用。从Intel x86[1]到微型嵌入式系统[2],ROP攻击适用于许多处理器架构。因此,在过去几年中提出了各种防御措施-最突出的是代码随机化(ASLR)和控制流完整性(CFI)。特别是,构建实用的CFI方案已成为近年来的研究热点。在这次演讲中,我们介绍了面向返回的编程(ROP)攻击和防御的演变。我们首先概述了ROP攻击和技术。其次,我们研究了基于软件多样性的方法的安全性,如细粒度代码随机化[3]。第三,我们深入研究并专注于控制流完整性(CFI),并展示如何绕过所有最近的(粗粒度)CFI解决方案,包括微软的防御工具EMET[4]。最后,我们讨论了减轻代码重用攻击的新研究方向,包括我们目前在硬件辅助的细粒度控制流完整性方面的工作[5]。部分研究[3-5]是与A. Dmitrienko、D. Lehmann、C. Liebchen、P. Koeberl、F. Monrose和K. Z. Snow合作进行的
{"title":"Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks","authors":"A. Sadeghi, Lucas Davi","doi":"10.1145/2666141.2668386","DOIUrl":"https://doi.org/10.1145/2666141.2668386","url":null,"abstract":"Code reuse attacks such as return-oriented programming (ROP) are predominant attack techniques that are extensively used to exploit vulnerabilities in modern software programs. ROP maliciously combines short instruction sequences (gadgets) residing in shared libraries and the application's executable to bypass data execution prevention (DEP) and launch targeted exploits. ROP attacks apply to many processor architectures from Intel x86 [1] to tiny embedded systems [2]. As a consequence, a variety of defenses have been proposed over the last few years - most prominently code randomization (ASLR) and control-flow integrity (CFI). Particularly, constructing practical CFI schemes has become a hot topic of research recently. In this talk, we present the evolution of return-oriented programming (ROP) attacks and defenses. We first give an overview of ROP attacks and techniques. Second, we investigate the security of software diversity based approaches such as finegrained code randomization [3]. Third, we dive deeper and focus on control-flow integrity (CFI) and show how to bypass all recent (coarse-grained) CFI solutions, including Microsoft's defense tool EMET [4]. Finally, we discuss new research directions to mitigate code reuse attacks, including our current work on hardware-assisted fine-grained control-flow integrity [5]. Part of this research [3-5] was conducted in collaboration with A. Dmitrienko, D. Lehmann, C. Liebchen, P. Koeberl, F. Monrose, and K. Z. Snow","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115142192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing Root of Trust for ARM TrustZone using On-Chip SRAM 使用片上SRAM为ARM TrustZone提供信任根
Pub Date : 2014-11-03 DOI: 10.1145/2666141.2666145
Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, D. Feng
We present the design, implementation and evaluation of the root of trust for the Trusted Execution Environment (TEE) provided by ARM TrustZone based on the on-chip SRAM Physical Unclonable Functions (PUFs). We first implement a building block which provides the foundations for the root of trust: secure key storage and truly random source. The building block doesn't require on or off-chip secure non-volatile memory to store secrets, but provides a high-level security: resistance to physical attackers capable of controlling all external interfaces of the system on chip (SoC). Based on the building block, we build the root of trust consisting of seal/unseal primitives for secure services running in the TEE, and a software-only TPM service running in the TEE which provides rich TPM functionalities for the rich OS running in the normal world of TrustZone. The root of trust resists software attackers capable of compromising the entire rich OS. Besides, both the building block and the root of trust run on the powerful ARM processor. In one word, we leverage the on-chip SRAM, commonly available on mobile devices, to achieve a low-cost, secure, and efficient design of the root of trust.
基于片上SRAM物理不可克隆功能(puf),提出了ARM TrustZone提供的可信执行环境(TEE)的信任根的设计、实现和评估。我们首先实现一个构建块,它为信任的根提供了基础:安全的密钥存储和真正的随机源。构建块不需要片上或片外安全的非易失性存储器来存储秘密,但提供了高级别安全性:抵抗能够控制片上系统(SoC)的所有外部接口的物理攻击者。在构建块的基础上,我们为运行在TEE中的安全服务构建了由密封/解密封原语组成的信任根,以及运行在TEE中的纯软件TPM服务,该服务为运行在TrustZone正常世界中的富操作系统提供丰富的TPM功能。信任的根源可以抵抗能够危害整个富操作系统的软件攻击者。此外,构建块和信任根都运行在功能强大的ARM处理器上。简而言之,我们利用移动设备上常见的片上SRAM来实现低成本、安全、高效的信任根设计。
{"title":"Providing Root of Trust for ARM TrustZone using On-Chip SRAM","authors":"Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, D. Feng","doi":"10.1145/2666141.2666145","DOIUrl":"https://doi.org/10.1145/2666141.2666145","url":null,"abstract":"We present the design, implementation and evaluation of the root of trust for the Trusted Execution Environment (TEE) provided by ARM TrustZone based on the on-chip SRAM Physical Unclonable Functions (PUFs). We first implement a building block which provides the foundations for the root of trust: secure key storage and truly random source. The building block doesn't require on or off-chip secure non-volatile memory to store secrets, but provides a high-level security: resistance to physical attackers capable of controlling all external interfaces of the system on chip (SoC). Based on the building block, we build the root of trust consisting of seal/unseal primitives for secure services running in the TEE, and a software-only TPM service running in the TEE which provides rich TPM functionalities for the rich OS running in the normal world of TrustZone. The root of trust resists software attackers capable of compromising the entire rich OS. Besides, both the building block and the root of trust run on the powerful ARM processor. In one word, we leverage the on-chip SRAM, commonly available on mobile devices, to achieve a low-cost, secure, and efficient design of the root of trust.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130543841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Challenges of Establishing Trust in Online Entities and Beyond 建立在线实体及其他信任的挑战
Pub Date : 2014-11-03 DOI: 10.1145/2666141.2668385
T. Kim
In today's Internet, authenticating online entities is challenging since people lack the real-world cues upon which to base their context-dependent trust decisions. For example, how can a user confirm that a Facebook invitation truly originates from the claimed sender, as anyone can trivially set up a bogus online identity with someone else's photo? Given an SSL certificate warning, how can a user validate it be- fore proceeding, as the certificate could be legitimate (e.g., the certificate is signed by a legitimate authority that the browser does not recognize) or malicious (e.g., it is signed by a compromised CA)? This talk demonstrates that providing useful evidence can empower users to make informed context-dependent trust decisions regarding previously unknown entities in the context of identity and public-key authentication. We first introduce an identity authentication logic called RelationGram that visualizes interpersonal tie strength of virtual entities using both physical and social proximities [2,4]. RelationGram enables casual users to authenticate online identities in a safe and easy manner, and build trust in previously unknown online entities. We then introduce new public-key validation proposals called Accountable Key Infrastructure (AKI) [3] and Attack Resilient Public-Key Infrastructure (ARPKI) [1] that reduce the amount of trust in any single entity to improve the resilience of the current PKI systems. AKI and ARPKI support trust agility such that entities select a security policy for their public-key certificates, and checks and balances such that entities monitor each other for misbehavior and prevent a single point of failure. When users are given pieces of evidence to which they can easily relate, they can make context-dependent authentication decisions online and build trust in online entities. As concluding remarks, we highlight some of the remaining challenges and future research directions to truly empower users to make informed trust decisions.
在今天的互联网中,对在线实体进行身份验证是一项挑战,因为人们缺乏基于上下文的信任决策的真实世界线索。例如,用户如何确认Facebook的邀请确实来自声称的发件人,因为任何人都可以轻易地用别人的照片建立一个虚假的在线身份?给定一个SSL证书警告,用户如何在继续之前验证它,因为证书可能是合法的(例如,证书是由浏览器无法识别的合法机构签署的)或恶意的(例如,它是由受损害的CA签署的)?这次演讲表明,提供有用的证据可以使用户能够在身份和公钥认证的上下文中对先前未知的实体做出知情的依赖于上下文的信任决策。我们首先引入了一种名为RelationGram的身份认证逻辑,该逻辑可以使用物理和社会接近度来可视化虚拟实体的人际联系强度[2,4]。RelationGram使普通用户能够以安全简便的方式验证在线身份,并对以前未知的在线实体建立信任。然后,我们引入了新的公钥验证建议,称为可问责密钥基础设施(AKI)[3]和攻击弹性公钥基础设施(ARPKI)[1],它们减少了对任何单个实体的信任量,以提高当前PKI系统的弹性。AKI和ARPKI支持信任敏捷性,这样实体就可以为它们的公钥证书选择安全策略,并进行检查和平衡,这样实体就可以相互监视错误行为并防止单点故障。当向用户提供他们可以轻松关联的证据时,他们可以在线做出与上下文相关的身份验证决策,并建立对在线实体的信任。作为结束语,我们强调了一些仍然存在的挑战和未来的研究方向,以真正授权用户做出明智的信任决策。
{"title":"Challenges of Establishing Trust in Online Entities and Beyond","authors":"T. Kim","doi":"10.1145/2666141.2668385","DOIUrl":"https://doi.org/10.1145/2666141.2668385","url":null,"abstract":"In today's Internet, authenticating online entities is challenging since people lack the real-world cues upon which to base their context-dependent trust decisions. For example, how can a user confirm that a Facebook invitation truly originates from the claimed sender, as anyone can trivially set up a bogus online identity with someone else's photo? Given an SSL certificate warning, how can a user validate it be- fore proceeding, as the certificate could be legitimate (e.g., the certificate is signed by a legitimate authority that the browser does not recognize) or malicious (e.g., it is signed by a compromised CA)? This talk demonstrates that providing useful evidence can empower users to make informed context-dependent trust decisions regarding previously unknown entities in the context of identity and public-key authentication. We first introduce an identity authentication logic called RelationGram that visualizes interpersonal tie strength of virtual entities using both physical and social proximities [2,4]. RelationGram enables casual users to authenticate online identities in a safe and easy manner, and build trust in previously unknown online entities. We then introduce new public-key validation proposals called Accountable Key Infrastructure (AKI) [3] and Attack Resilient Public-Key Infrastructure (ARPKI) [1] that reduce the amount of trust in any single entity to improve the resilience of the current PKI systems. AKI and ARPKI support trust agility such that entities select a security policy for their public-key certificates, and checks and balances such that entities monitor each other for misbehavior and prevent a single point of failure. When users are given pieces of evidence to which they can easily relate, they can make context-dependent authentication decisions online and build trust in online entities. As concluding remarks, we highlight some of the remaining challenges and future research directions to truly empower users to make informed trust decisions.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128084763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity lowpan安全性:使用通道互惠避免隐藏虫洞
Pub Date : 2014-11-03 DOI: 10.1145/2666141.2666143
Konrad-Felix Krentz, G. Wunder
6LoWPAN networks are 802.15.4-based wireless sensor Networks that seamlessly integrate with IPv6 networks using specially designed protocols. Unfortunately, 6LoWPAN networks are vulnerable to hidden wormholes. To detect and subsequently avoid hidden wormholes, Jain et al. recently proposed two schemes, which exploit the reciprocity of received signal strength indicators (RSSIs). However, threats and attacks can mislead Jain et al.'s schemes into reaching false positives or false negatives. Moreover, their schemes take calibrated RSSIs for granted, which is impractical. In this paper, we propose "Secure Channel REciprocity-based WormholE Detection (SCREWED)", which avoids both false positives and false negatives to a great extend. For this, SCREWED uses channel hopping, randomized transmission powers, message integrity codes, as well as a special replay protection mechanism. Furthermore, SCREWED obviates the need for calibrating RSSIs by using a different channel reciprocity metric. We integrated SCREWED into the link layer of Contiki's 6LoWPAN stack and demonstrate SCREWED's efficacy using TelosB motes.
6LoWPAN网络是基于802.15.4的无线传感器网络,使用特殊设计的协议与IPv6网络无缝集成。不幸的是,6LoWPAN网络很容易受到隐藏虫洞的攻击。为了检测并随后避免隐藏的虫洞,Jain等人最近提出了两种利用接收信号强度指标(rssi)互易性的方案。然而,威胁和攻击可能会误导Jain等人的方案达到假阳性或假阴性。此外,他们的方案将校准后的rssi视为理所当然,这是不切实际的。在本文中,我们提出了“基于安全通道互向性的虫洞检测(screw)”,它在很大程度上避免了误报和误报。为此,screw使用了信道跳变、随机传输功率、消息完整性码以及特殊的重放保护机制。此外,通过使用不同的通道互易度量,螺纹消除了校准rssi的需要。我们将screw集成到Contiki的6LoWPAN堆栈的链路层中,并使用TelosB motes演示了screw的有效性。
{"title":"6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity","authors":"Konrad-Felix Krentz, G. Wunder","doi":"10.1145/2666141.2666143","DOIUrl":"https://doi.org/10.1145/2666141.2666143","url":null,"abstract":"6LoWPAN networks are 802.15.4-based wireless sensor Networks that seamlessly integrate with IPv6 networks using specially designed protocols. Unfortunately, 6LoWPAN networks are vulnerable to hidden wormholes. To detect and subsequently avoid hidden wormholes, Jain et al. recently proposed two schemes, which exploit the reciprocity of received signal strength indicators (RSSIs). However, threats and attacks can mislead Jain et al.'s schemes into reaching false positives or false negatives. Moreover, their schemes take calibrated RSSIs for granted, which is impractical. In this paper, we propose \"Secure Channel REciprocity-based WormholE Detection (SCREWED)\", which avoids both false positives and false negatives to a great extend. For this, SCREWED uses channel hopping, randomized transmission powers, message integrity codes, as well as a special replay protection mechanism. Furthermore, SCREWED obviates the need for calibrating RSSIs by using a different channel reciprocity metric. We integrated SCREWED into the link layer of Contiki's 6LoWPAN stack and demonstrate SCREWED's efficacy using TelosB motes.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127865486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
How to Build Hardware Trojans 如何构建硬件木马
Pub Date : 2014-11-03 DOI: 10.1145/2666141.2668384
C. Paar
Countless systems ranging from consumer electronics to military equipment are dependent on integrated circuits (ICs). A surprisingly large number of such systems are already security critical, e.g., medical devices, automotive electronics, or SCADA systems. If the underlying ICs in such applications are maliciously manipulated through hardware Trojans, the security of the entire system can be compromised. In recent years, hardware Trojans have drawn the attention of governments and the scientific community. Initially, the primary attacker model was a malicious foundry that could alter the design, i.e., introduce hardware Trojans which could interfere with the (securitysensitive) functionality of a chip. Many other attacker models exist too. For instance, a legitimate IC manufacturer, e.g., a consumer electronics company abroad, might be in cohort with a foreign intelligence agency to alter its products in a way that compromises their security. Even though hardware Trojans have been considerably studied, little is known about how they might look, especially those that are particularly designed to avoid detection. In this talk we introduce two recent research projects which deal with the Trojan insertion in two different types of hardware platforms, ASICs and FPGAs. This is joint work with Georg Becker, Wayne Burleson, Marc Fyrbiak, Philipp Koppe, Franceso Regazzoni and Pawel Swierczynski.
从消费电子产品到军事设备,无数系统都依赖于集成电路(ic)。令人惊讶的是,大量这样的系统已经对安全性至关重要,例如医疗设备、汽车电子设备或SCADA系统。如果这些应用程序中的底层ic被硬件木马恶意操纵,整个系统的安全性就会受到威胁。近年来,硬件木马已经引起了政府和科学界的注意。最初,主要的攻击者模型是一个可以改变设计的恶意铸造厂,即引入可能干扰(安全敏感)芯片功能的硬件木马。还有许多其他的攻击者模型。例如,一家合法的集成电路制造商,例如国外的一家消费电子公司,可能与外国情报机构合作,以一种危及其安全的方式改变其产品。尽管人们对硬件木马进行了大量的研究,但人们对它们的外观知之甚少,尤其是那些特别设计以避免被发现的木马。在这次演讲中,我们介绍了两个最近的研究项目,它们处理在两种不同类型的硬件平台,asic和fpga中的木马插入。这是与Georg Becker、Wayne Burleson、Marc Fyrbiak、Philipp Koppe、Franceso Regazzoni和Pawel Swierczynski合作的作品。
{"title":"How to Build Hardware Trojans","authors":"C. Paar","doi":"10.1145/2666141.2668384","DOIUrl":"https://doi.org/10.1145/2666141.2668384","url":null,"abstract":"Countless systems ranging from consumer electronics to military equipment are dependent on integrated circuits (ICs). A surprisingly large number of such systems are already security critical, e.g., medical devices, automotive electronics, or SCADA systems. If the underlying ICs in such applications are maliciously manipulated through hardware Trojans, the security of the entire system can be compromised. In recent years, hardware Trojans have drawn the attention of governments and the scientific community. Initially, the primary attacker model was a malicious foundry that could alter the design, i.e., introduce hardware Trojans which could interfere with the (securitysensitive) functionality of a chip. Many other attacker models exist too. For instance, a legitimate IC manufacturer, e.g., a consumer electronics company abroad, might be in cohort with a foreign intelligence agency to alter its products in a way that compromises their security. Even though hardware Trojans have been considerably studied, little is known about how they might look, especially those that are particularly designed to avoid detection. In this talk we introduce two recent research projects which deal with the Trojan insertion in two different types of hardware platforms, ASICs and FPGAs. This is joint work with Georg Becker, Wayne Burleson, Marc Fyrbiak, Philipp Koppe, Franceso Regazzoni and Pawel Swierczynski.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"59 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113933483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Algorithm for Task Scheduling against Side-channel Attacks 一种抗侧信道攻击的安全任务调度算法
Pub Date : 2014-11-03 DOI: 10.1145/2666141.2666142
Chongxi Bao, Ankur Srivastava
The problem of ordering task executions has been well studied under power, performance, and thermal constraints. However, it has been pursued less under security concerns. We have observed that different orders of task executions have different side-channel information leakage, thus having different security levels. In this paper, we first model the behavior of the attacker and then propose a secure algorithm for ordering aperiodic tasks that have soft deadlines. Our algorithm can keep a good balance between side-channel information leakage and total lateness. Experimental results show that the attacker could make 38.65% more error inferring the state of chip through side-channel analysis if tasks are scheduled using our algorithm as compared to using algorithms without security consideration (like EDF algorithm).
在功率、性能和热约束下,排序任务执行的问题已经得到了很好的研究。然而,出于安全方面的考虑,这种做法较少。我们观察到,不同的任务执行顺序有不同的侧通道信息泄漏,因此具有不同的安全级别。在本文中,我们首先对攻击者的行为建模,然后提出了一种安全算法来排序具有软截止日期的非周期任务。该算法可以很好地平衡侧信道信息泄漏和总延迟。实验结果表明,与使用不考虑安全性的算法(如EDF算法)相比,使用我们的算法调度任务,攻击者通过侧信道分析推断芯片状态的误差可提高38.65%。
{"title":"A Secure Algorithm for Task Scheduling against Side-channel Attacks","authors":"Chongxi Bao, Ankur Srivastava","doi":"10.1145/2666141.2666142","DOIUrl":"https://doi.org/10.1145/2666141.2666142","url":null,"abstract":"The problem of ordering task executions has been well studied under power, performance, and thermal constraints. However, it has been pursued less under security concerns. We have observed that different orders of task executions have different side-channel information leakage, thus having different security levels. In this paper, we first model the behavior of the attacker and then propose a secure algorithm for ordering aperiodic tasks that have soft deadlines. Our algorithm can keep a good balance between side-channel information leakage and total lateness. Experimental results show that the attacker could make 38.65% more error inferring the state of chip through side-channel analysis if tasks are scheduled using our algorithm as compared to using algorithms without security consideration (like EDF algorithm).","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"7 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113962045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Challenges in Remote Attestation of Low-End Embedded Devices 低端嵌入式设备远程认证的挑战
Pub Date : 2014-11-03 DOI: 10.1145/2666141.2668383
G. Tsudik
Embedded computing devices increasingly permeate many aspects of modern life: from medical to automotive, from building and factory automation to weapons, from avionics to home entertainment. Despite their specialized nature as well as limited resources and connectivity, these devices are becoming an increasingly popular and attractive target for remote malware infestation attacks, exemplified by Stuxnet [1]. Many mitigation techniques have been proposed, varying in terms of generality and underlying assumptions. One common theme is the need for Remote Attestation, a distinct security service that allows a trusted party (verifier) to check the internal state of a remote untrusted embedded device (prover). Purely software-based techniques, while efficient, offer dubious security guarantees. Most hardware-based techniques are too costly for low-end embedded devices.This talk focuses on three important challenges in designing Remote Attestation techniques for low-end embedded devices. First, what is the minimal set of hardware and software features for a low-end embedded device to attain provably secure remote attestation, under the strongest possible and realistic adversary model? Second, what mechanisms and features are needed to protect the remote attestation process from unauthorized invocation, i.e., how to assure that an embedded device is not being misused? Third, how to design efficient remote attestation for a multitude of potentially heterogeneous embedded devices, e.g., within a vehicle, a household, or an aircraft? Some of this research [2-4] was conducted in collaboration with K. Eldefrawy, A. Francillon, D. Perito and K. Rasmussen.
嵌入式计算设备日益渗透到现代生活的许多方面:从医疗到汽车,从建筑和工厂自动化到武器,从航空电子设备到家庭娱乐。尽管这些设备具有专业性以及有限的资源和连接性,但它们正成为远程恶意软件入侵攻击的一个越来越受欢迎和有吸引力的目标,例如震网[1]。已经提出了许多缓解技术,在一般性和基本假设方面各不相同。一个常见的主题是需要远程认证,这是一种独特的安全服务,允许受信任的一方(验证者)检查远程不受信任的嵌入式设备(证明者)的内部状态。纯粹基于软件的技术虽然有效,但提供了可疑的安全保证。大多数基于硬件的技术对于低端嵌入式设备来说过于昂贵。本次演讲的重点是为低端嵌入式设备设计远程认证技术的三个重要挑战。首先,在最强大和现实的对手模型下,低端嵌入式设备实现可证明的安全远程认证的最小硬件和软件功能集是什么?其次,需要什么样的机制和特性来保护远程认证过程免受未经授权的调用,即,如何确保嵌入式设备不被滥用?第三,如何为众多潜在的异构嵌入式设备(例如,在车辆,家庭或飞机内)设计有效的远程认证?其中一些研究[2-4]是与K. Eldefrawy、A. Francillon、D. Perito和K. Rasmussen合作进行的。
{"title":"Challenges in Remote Attestation of Low-End Embedded Devices","authors":"G. Tsudik","doi":"10.1145/2666141.2668383","DOIUrl":"https://doi.org/10.1145/2666141.2668383","url":null,"abstract":"Embedded computing devices increasingly permeate many aspects of modern life: from medical to automotive, from building and factory automation to weapons, from avionics to home entertainment. Despite their specialized nature as well as limited resources and connectivity, these devices are becoming an increasingly popular and attractive target for remote malware infestation attacks, exemplified by Stuxnet [1]. Many mitigation techniques have been proposed, varying in terms of generality and underlying assumptions. One common theme is the need for Remote Attestation, a distinct security service that allows a trusted party (verifier) to check the internal state of a remote untrusted embedded device (prover). Purely software-based techniques, while efficient, offer dubious security guarantees. Most hardware-based techniques are too costly for low-end embedded devices.This talk focuses on three important challenges in designing Remote Attestation techniques for low-end embedded devices. First, what is the minimal set of hardware and software features for a low-end embedded device to attain provably secure remote attestation, under the strongest possible and realistic adversary model? Second, what mechanisms and features are needed to protect the remote attestation process from unauthorized invocation, i.e., how to assure that an embedded device is not being misused? Third, how to design efficient remote attestation for a multitude of potentially heterogeneous embedded devices, e.g., within a vehicle, a household, or an aircraft? Some of this research [2-4] was conducted in collaboration with K. Eldefrawy, A. Francillon, D. Perito and K. Rasmussen.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128075184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Embedded System Security in Smart Consumer Electronics 智能消费电子产品中的嵌入式系统安全
Pub Date : 2014-11-03 DOI: 10.1145/2666141.2673888
Yier Jin
Advances in manufacturing and emerging technologies in miniaturization and reduction of power consumption have proven to be a pivotal point in mankind's progress. The once advanced machines that occupied entire buildings and needed hundreds of engineers to be operated are now shadowed by the smart cellular phones we carry in our pockets. With the advent of the Internet and proliferation of wireless technologies, these devices are now extremely interconnected. Enter the nascent era of Internet of Things (IoT) and wearable devices, where small embedded devices loaded with sensors collect information from its surroundings, process it and relay it to remote locations for further analysis. Albeit looking harmless, this nascent technologies raise security and privacy concerns. In this talk, we pose the question of the possibility and effects of compromising one of such devices. Concentrating on the design flow of IoT devices, we discuss some common design practices and their implications on security and privacy. We present the Google Nest Learning Thermostat as an example on how these practices affect the resulting device and the potential consequences to user security and privacy. We will then introduce design flow security enhancement methods through which security will be built into the device, a major difference from traditional practices which treat security as an add-on property implemented at post-fabrication stage.
制造业的进步和小型化、低能耗等新兴技术已被证明是人类进步的关键。曾经占据整栋大楼、需要数百名工程师操作的先进机器,现在被我们口袋里的智能手机所取代。随着互联网的出现和无线技术的普及,这些设备现在是高度互联的。进入物联网(IoT)和可穿戴设备的新生时代,装载传感器的小型嵌入式设备从周围环境收集信息,对其进行处理并将其转发到远程位置进行进一步分析。尽管看起来无害,但这种新兴技术引发了人们对安全和隐私的担忧。在这次谈话中,我们提出了妥协其中一个装置的可能性和影响的问题。专注于物联网设备的设计流程,我们讨论了一些常见的设计实践及其对安全和隐私的影响。我们以谷歌Nest学习恒温器为例,说明这些做法如何影响最终设备以及对用户安全和隐私的潜在后果。然后,我们将介绍设计流程安全增强方法,通过这些方法,安全将被内置到设备中,这与将安全视为在后制造阶段实现的附加属性的传统做法有很大区别。
{"title":"Embedded System Security in Smart Consumer Electronics","authors":"Yier Jin","doi":"10.1145/2666141.2673888","DOIUrl":"https://doi.org/10.1145/2666141.2673888","url":null,"abstract":"Advances in manufacturing and emerging technologies in miniaturization and reduction of power consumption have proven to be a pivotal point in mankind's progress. The once advanced machines that occupied entire buildings and needed hundreds of engineers to be operated are now shadowed by the smart cellular phones we carry in our pockets. With the advent of the Internet and proliferation of wireless technologies, these devices are now extremely interconnected. Enter the nascent era of Internet of Things (IoT) and wearable devices, where small embedded devices loaded with sensors collect information from its surroundings, process it and relay it to remote locations for further analysis. Albeit looking harmless, this nascent technologies raise security and privacy concerns. In this talk, we pose the question of the possibility and effects of compromising one of such devices. Concentrating on the design flow of IoT devices, we discuss some common design practices and their implications on security and privacy. We present the Google Nest Learning Thermostat as an example on how these practices affect the resulting device and the potential consequences to user security and privacy. We will then introduce design flow security enhancement methods through which security will be built into the device, a major difference from traditional practices which treat security as an add-on property implemented at post-fabrication stage.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114812912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor SoC中的简单AEAD硬件接口(SÆHI):实现片上Keyak/WhirlBob协处理器
Pub Date : 2014-11-03 DOI: 10.1145/2666141.2666144
Markku-Juhani O. Saarinen
Simple AEAD Hardware Interface (SÆHI) is a hardware cryptographic interface aimed at CAESAR Authenticated Encryption with Associated Data (AEAD) algorithms. Cryptographic acceleration is typically achieved either with a coprocessor or via instruction set extensions. ISA modifications require re-engineering the CPU core, making the approach inapplicable outside the realm of open source processor cores. At minimum, we suggest implementing CAESAR AEADs as universal memory-mapped cryptographic coprocessors, synthesizable even on low end FPGA platforms. AEADs complying to SÆHI must also include C language API drivers targeting low-end MCUs that directly utilize the memory mapping in a ``bare metal'' fashion. This can also be accommodated on MMU-equipped mid-range CPUs. Extended battery life and bandwidth resulting from dedicated cryptographic hardware is vital for currently dominant computing and communication devices: mobile phones, tablets, and Internet-of-Things (IoT) applications. We argue that these should be priority hardware optimization targets for AEAD algorithms with realistic payload profiles. We demonstrate a fully integrated implementation of WhirlBob and Keyak AEADs on the FPGA fabric of Xilinx Zynq 7010. This low-cost System-on-Chip (SoC) also houses a dual-core Cortex-A9 CPU, closely matching the architecture of many embedded devices. The on-chip coprocessor is accessible from user space with a Linux kernel driver. An integration path exists all the way to end-user applications.
Simple AEAD Hardware Interface (SÆHI)是一个针对CAESAR AEAD (Authenticated Encryption with Associated Data)算法的硬件加密接口。加密加速通常通过协处理器或指令集扩展来实现。ISA修改需要重新设计CPU核心,这使得该方法不适用于开源处理器核心领域之外。至少,我们建议将CAESAR aead实现为通用内存映射加密协处理器,即使在低端FPGA平台上也可以合成。遵守SÆHI的aead还必须包含针对低端mcu的C语言API驱动程序,这些低端mcu直接以“裸机”方式利用内存映射。这也可以容纳在配备mmu的中档cpu上。专用加密硬件带来的延长电池寿命和带宽对于当前占主导地位的计算和通信设备(移动电话、平板电脑和物联网(IoT)应用)至关重要。我们认为这些应该是具有实际有效载荷概况的AEAD算法的优先硬件优化目标。我们在Xilinx Zynq 7010的FPGA结构上演示了一个完全集成的WhirlBob和Keyak aead实现。这种低成本的片上系统(SoC)还包含一个双核Cortex-A9 CPU,与许多嵌入式设备的架构紧密匹配。片上协处理器可以通过Linux内核驱动程序从用户空间访问。集成路径一直存在于最终用户应用程序中。
{"title":"Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor","authors":"Markku-Juhani O. Saarinen","doi":"10.1145/2666141.2666144","DOIUrl":"https://doi.org/10.1145/2666141.2666144","url":null,"abstract":"Simple AEAD Hardware Interface (SÆHI) is a hardware cryptographic interface aimed at CAESAR Authenticated Encryption with Associated Data (AEAD) algorithms. Cryptographic acceleration is typically achieved either with a coprocessor or via instruction set extensions. ISA modifications require re-engineering the CPU core, making the approach inapplicable outside the realm of open source processor cores. At minimum, we suggest implementing CAESAR AEADs as universal memory-mapped cryptographic coprocessors, synthesizable even on low end FPGA platforms. AEADs complying to SÆHI must also include C language API drivers targeting low-end MCUs that directly utilize the memory mapping in a ``bare metal'' fashion. This can also be accommodated on MMU-equipped mid-range CPUs.\u0000 Extended battery life and bandwidth resulting from dedicated cryptographic hardware is vital for currently dominant computing and communication devices: mobile phones, tablets, and Internet-of-Things (IoT) applications. We argue that these should be priority hardware optimization targets for AEAD algorithms with realistic payload profiles.\u0000 We demonstrate a fully integrated implementation of WhirlBob and Keyak AEADs on the FPGA fabric of Xilinx Zynq 7010. This low-cost System-on-Chip (SoC) also houses a dual-core Cortex-A9 CPU, closely matching the architecture of many embedded devices. The on-chip coprocessor is accessible from user space with a Linux kernel driver. An integration path exists all the way to end-user applications.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131716445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Citizen Electronic Identities using TPM 2.0 使用TPM 2.0的公民电子身份
Pub Date : 2014-09-03 DOI: 10.1145/2666141.2666146
Thomas Nyman, Jan-Erik Ekberg, N. Asokan
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access control. Typical eID tokens take the form of physical smart cards, but successes in merging eID into phone operator SIM cards show that eID tokens integrated into a personal device can offer better usability compared to standalone tokens. At the same time, trusted hardware that enables secure storage and isolated processing of sensitive data have become commonplace both on PC platforms as well as mobile devices. Some time ago, the Trusted Computing Group (TCG) released the version 2.0 of the Trusted Platform Module (TPM) specification. We propose an eID architecture based on the new, rich authorization model introduced in the TCGs TPM 2.0. The goal of the design is to improve the overall security and usability compared to traditional smart card-based solutions. We also provide, to the best our knowledge, the first accessible description of the TPM 2.0 authorization model.
电子身份识别(eID)在几个欧洲国家正变得越来越普遍。eID通常用于对政府电子服务进行身份验证,但也用于其他服务,如公共交通、电子银行和物理安全访问控制。典型的eID令牌采用实体智能卡的形式,但将eID与电话运营商SIM卡合并的成功案例表明,与独立令牌相比,将eID令牌集成到个人设备中可以提供更好的可用性。与此同时,能够安全存储和隔离处理敏感数据的可信硬件已经在PC平台和移动设备上变得司空见惯。不久前,可信计算组(TCG)发布了可信平台模块(TPM)规范的2.0版本。我们提出了一种基于TCGs TPM 2.0中引入的新的富授权模型的eID体系结构。与传统的基于智能卡的解决方案相比,该设计的目标是提高整体安全性和可用性。据我们所知,我们还提供了关于TPM 2.0授权模型的第一个可访问的描述。
{"title":"Citizen Electronic Identities using TPM 2.0","authors":"Thomas Nyman, Jan-Erik Ekberg, N. Asokan","doi":"10.1145/2666141.2666146","DOIUrl":"https://doi.org/10.1145/2666141.2666146","url":null,"abstract":"Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access control. Typical eID tokens take the form of physical smart cards, but successes in merging eID into phone operator SIM cards show that eID tokens integrated into a personal device can offer better usability compared to standalone tokens. At the same time, trusted hardware that enables secure storage and isolated processing of sensitive data have become commonplace both on PC platforms as well as mobile devices. Some time ago, the Trusted Computing Group (TCG) released the version 2.0 of the Trusted Platform Module (TPM) specification. We propose an eID architecture based on the new, rich authorization model introduced in the TCGs TPM 2.0. The goal of the design is to improve the overall security and usability compared to traditional smart card-based solutions. We also provide, to the best our knowledge, the first accessible description of the TPM 2.0 authorization model.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115937895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
Workshop on Trustworthy Embedded Devices
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1