期刊
2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022)
卷 -, 期 -, 页码 520-536出版社
IEEE COMPUTER SOC
DOI: 10.1109/EuroSP53844.2022.00039
关键词
microcontroller security; code reuse attack; TrustZone; randomization
类别
资金
- University of Georgia Research Foundation, Inc.
Microcontroller-based embedded systems are widely used in IoT technology, and their security is crucial. However, MCU devices are vulnerable to code reuse attacks. This study proposes the HARM system, the first solution for ARM-based MCUs, which proactively triggers non-bypassable randomization to effectively prevent code reuse attacks while maintaining low performance and energy overhead.
Microcontroller-based embedded systems have become ubiquitous with the emergence of IoT technology. Given its critical roles in many applications, its security is becoming increasingly important. Unfortunately, MCU devices are especially vulnerable. Code reuse attacks are particularly noteworthy since the memory address of firmware code is static. This work seeks to combat code reuse attacks, including ROP and more advanced JIT-ROP via continuous randomization. Previous proposals are geared towards full-fledged OSs with rich runtime environments, and therefore cannot be applied to MCUs. We propose the first solution for ARM-based MCUs. Our system, named HARM, comprises a secure runtime and a binary analysis tool with rewriting module. The secure runtime, protected inside the secure world, proactively triggers and performs non-bypassable randomization to the firmware running in a sandbox in the normal world. Our system does not rely on any firmware feature, and therefore is generally applicable to both bare-metal and RTOS-powered firmware. We have implemented a prototype on a development board. Our evaluation results indicate that HARM can effectively thaw code reuse attacks while keeping the performance and energy overhead low.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据