首页> 外文会议>9th ACM workshop on digital rights management 2009 >On the difficulty of software-based attestation of embedded devices
【24h】

On the difficulty of software-based attestation of embedded devices

机译:关于嵌入式设备基于软件的认证的难度

获取原文
获取原文并翻译 | 示例

摘要

Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be attested, makes attestation of embedded devices, in applications such as Wireless Sensor Networks, a prominent challenge. Several software-based attestation techniques have been proposed that either rely on tight time constraints or on the lack of free space to store malicious code. This paper investigates the shortcomings of existing software-based attestation techniques. We first present two generic attacks, one based on a return-oriented rootkit} and the other on code compression. We further describe specific attacks on two existing proposals, namely SWATT and ICE-based schemes, and argue about the difficulty of fixing them. All attacks presented in this paper were implemented and validated on commodity sensors.
机译:设备证明是许多安全协议和应用程序中的基本功能。缺少专用硬件以及无法通过物理方式访问待认证的设备,使得在无线传感器网络等应用中对嵌入式设备进行认证成为了一个严峻的挑战。已经提出了几种基于软件的证明技术,这些技术要么依靠严格的时间限制,要么依靠缺乏可用空间来存储恶意代码。本文研究了现有基于软件的证明技术的缺点。我们首先提出两种通用攻击,一种基于基于返回的rootkit的攻击,另一种基于代码压缩的攻击。我们进一步描述了针对两个现有建议(即SWATT和基于ICE的方案)的特定攻击,并讨论了解决它们的难度。本文介绍的所有攻击均在商品传感器上实施和验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号