Embedded Linux Integrity

نویسنده

  • David Safford
چکیده

Linux is in widespread use in embedded devices, but these devices typically lack critical security features found in higher-end Linux systems. They typically do not have any way to validate their firmware, they do not have hardware roots of trust for trusted or secure boot, they do not have provisions for physical presence, to protect firmware from remote modification, and they do not have secure update. Vendors claim that these features are either too large, or too expensive to fit in their embedded devices. This paper summarizes the recent widespread vulnerabilities and compromises of embedded devices, and shows how the given security features would defeat such attacks. It relates the concepts to the NIST SP800 guidelines for BIOS measurement and protection, and to the ongoing work on Linux secure boot for higher end devices. It looks at four typical embedded devices, shows how all of these features can be added at zero cost.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Application-Oriented Linux Kernel Customization for Embedded Systems

How to reconfigure a general purpose operating system (GPOS) into an embedded operating system has attracted attention for application-specific domains. Linux is currently one of the popular candidates for GPOSs. Although Linux has tools for kernel reconfiguration by letting users add or remove desired function modules, the best schemes of reconfiguring Linux according to a specific embedded sy...

متن کامل

Multipersona Hypovisors: Securing Mobile Devices through High-Performance Light-Weight Subsystem Isolation

We propose and detail a system called multipersona Hypovisors for providing light-weight isolation for enhancing security on Multipersona mobile devices, particularly with respect to the current memory constraints of these devices. Multipersona Hypovisors leverage Linux kernel cGroups and namespaces to establish independent process container, allowing isolation of the Multipersona process tree ...

متن کامل

Facing the Linux 8000 Feature Nightmare

System software, especially operating systems, tends to be highly configurable. The relatively small eCos operating system for embedded applications [1] already offers more than 750 features; current versions of Linux provide even more than 8000 configuration options – which technically are implemented and enforced in the code by means of preprocessor macros. To assist the user on his path thro...

متن کامل

Compact Integrity - Aware Architectures

Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide range of systems, from embedded systems to servers in data centers. In this dissertation, we design and evaluate approaches for remotely attesting software integrity and blocking infections on a variety of systems using integrity kernels. Existing hardware architectures provide inadequate support f...

متن کامل

Trail: A Fast Synchronous Write Disk Subsystem Using Track-Based Logging

Synchronous disk write presents a serious performance problem for those applications that require strong data integrity guarantee. This paper describes the design and implementation of Trail, a disk subsystem that features a track-based logging technique to minimize the performance impact of synchronous disk write operations. We have demonstrated in this research that Trailcan reduce the latenc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013