首页> 外文会议>Association for Computing Machinery Conference on Computer and Communications Security >On the Difficulty of Software-Based Attestation of Embedded Dewices
【24h】

On the Difficulty of Software-Based Attestation of Embedded Dewices

机译:基于软件的嵌入式设备的证明难度

获取原文

摘要

Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be attested, makes attestation of embedded devices, in applications such as Wireless Sensor Networks, a prominent challenge. Several software-based attestation techniques have been proposed that either rely on tight time constraints or on the lack of free space to store malicious code. This paper investigates the shortcomings of existing software-based attestation techniques. We first present two generic attacks, one based on a return-oriented rootkit and the other on code compression. We further describe specific attacks on two existing proposals, namely SWATT and ICE-based schemes, and argue about the difficulty of fixing them. All attacks presented in this paper were implemented and validated on commodity sensors.
机译:设备证明是许多安全协议和应用程序中的重要特征。 缺乏专用硬件和无法证明设备的物理访问设备,使嵌入式设备的证明是无线传感器网络,突出挑战的应用。 已经提出了几种基于软件的证明技术,依赖于紧密的时间限制或缺乏自由空间来存储恶意代码。 本文调查了现有的基于软件的证明技术的缺点。 我们首先呈现两个泛型攻击,一个基于返回面向rootkit,另一个在代码压缩上。 我们进一步描述了对两个现有提案的特定攻击,即SWATT和基于冰和冰的方案,并争论修复它们的难度。 本文提出的所有攻击都在商品传感器上实施和验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号