...
首页> 外文期刊>Computers & Security >DO-RA: Data-oriented runtime attestation for IoT devices
【24h】

DO-RA: Data-oriented runtime attestation for IoT devices

机译:DO-RA:IOT设备面向数据的运行时验证

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Remote attestation is an excellent approach to confirm the security states of Internet of Things (IoT) devices. It allows an entity (verifier) to validate the integrity of a potentially compromised platform (prover). Most of the current attestation schemes are static, which verify only the software integrity of devices. Recently, some runtime attestation schemes based on the Control Flow Graph (CFG) of the program have been proposed to collect the runtime information. However, the algorithm for constructing CFG only focuses on the rationality of the programs' control flow, and ignores the possibility that attackers could compromise the control flow of the device by modifying key data. Some mitigation of runtime exploitation technologies take into account the Unique Code Target (UCT) property of control flow, but there are limitations to their algorithms abilities to find out the constraining data. In this paper, we present a Data-Oriented Control Flow Graph (DO-CFG) that can match a single legitimate target for each control-flow transfer, which guarantees both the rationality and the full uniqueness of programs' control flow. Furthermore, we propose a Data-Oriented Runtime Attestation (DO-RA) scheme based on DO-CFG. It collects some critical non-control data to enhance the detection ability of the attestation scheme, which further ensures the uniqueness of the control flow. We also present a detailed proof-of-concept implementation and analyze our protocol based on Raspberry Pi. We simulate several real applications to evaluate the security and performance of DO-RA, which demonstrates that our scheme provides a more comprehensive detection capability within an acceptable overhead.
机译:远程证明是确认物联网的安全状态(IOT)设备的一个很好的方法。它允许实体(验证程序)验证潜在受损平台(谚语)的完整性。大多数当前的证明方案都是静态的,只验证了设备的软件完整性。最近,已经提出了基于程序的控制流程图(CFG)的一些运行时间认证方案来收集运行时信息。然而,用于构建CFG的算法仅侧重于程序控制流程的合理性,并忽略攻击者通过修改密钥数据来损害设备的控制流程的可能性。对运行时利用技术的一些缓解考虑了控制流程的唯一代码目标(UCT)属性,但它们的算法能力有限制来找出约束数据。在本文中,我们介绍了一个数据导向的控制流程图(DO-CFG),可以匹配每个控制流传输的单个合法目标,这保证了程序控制流程的合理性和全唯一性。此外,我们提出了一种基于DO-CFG的数据导向的运行时间证明(DO-RA)方案。它收集一些关键的非控制数据,以增强证明方案的检测能力,这进一步确保了控制流的唯一性。我们还提供了一个详细的概念证明,并根据覆盆子PI分析我们的协议。我们模拟了几个真正的应用程序来评估DO-RA的安全性和性能,这表明我们的方案在可接受的开销中提供了更全面的检测能力。

著录项

  • 来源
    《Computers & Security》 |2020年第10期|101945.1-101945.11|共11页
  • 作者单位

    School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China;

    School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China;

    Department of Computer and Information Systems University of Aizu Fukushima Japan;

    School of Computing and Information Technology Institute of Cybersecurity and Cryptology University of Wollongong Wollongong Australia;

    National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing PR China;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Internet of things; Remote attestation; Software integrity; Control flow graph; Unique code target;

    机译:物联网;远程证明;软件完整;控制流程图;唯一的代码目标;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号