Using Software-based Attestation for Verifying Embedded Systems in Cars

نویسندگان

  • Arvind Seshadri
  • Adrian Perrig
  • Leendert van Doorn
  • Pradeep Khosla
چکیده

With advances in automobile electronics, we find a rapid proliferation of embedded systems in cars, both in safety-critical applications and for passenger comfort. These embedded systems are increasingly networked for their operation and enhanced functionality. However, the increased connectivity of embedded systems also greatly complicates design, increases the number of failure modes, and introduces the risk of remote malicious attacks, such as worms and viruses. Moreover, car owners may alter the code on their car to access features they did not pay for or achieve higher motor performance. Such owner-initiated changes are likely to deteriorate the car’s safety. We propose SWATT, a SoftWare-based ATTestation mechanism to detect and defend against these threats. SWATT enables an external verifier to verify the code of a running system to detect maliciously inserted or altered code. So far, code attestation has been proposed as a mechanism to verify the code running on a system, and special hardware mechanisms have been designed to achieve this property, e.g., TCG (formerly known as TCPA) [15] and NGSCB (formerly known as Palladium) [6]. However, special hardware to provide attestation may not be available in legacy systems or due to cost reasons. Therefore, we design SWATT to be software-based. Code attestation is instrumental to many applications, such as remote detection of malicious code (such as Trojan horses and viruses) in embedded systems and gives an assurance that critical embedded systems are running the correct code. If we use SWATT to verify code running on embedded systems in a car, an attacker is forced to perform a hardware change to hide the presence of altered code; greatly increasing the effort required by an attacker and preventing entire classes of remote attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Code Update for Embedded Devices via Proofs of Secure Erasure

Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previously proposed remote attestation techniques assisted by specialized secure hardware are effective, they not yet viable for low-cost embedded devices. One notable alternative is software-based attestation, that is both...

متن کامل

SimHAT: Simulated Hardware-based Attestation evaluation Tool

Embedded devices have come to play an important role in our daily lives. Increasingly, diverse fields like healthcare systems, banks and more are using these devices to automate underlying complex tasks. This reliance has led to a significant development – exposure of devices to malicious attacks, including control and subversion of software onboard. Software attestation has been herald as a so...

متن کامل

Practical Analysis Framework for Software-Based Attestation Scheme

An increasing number of "smart" embedded devices are employed in our living environment nowadays. Unlike traditional computer systems, these devices are often physically accessible to the attackers. It is therefore almost impossible to guarantee that they are un-compromised, i.e., that indeed the devices are executing the intended software. In such a context, software-based attestation is deeme...

متن کامل

Towards Provably Secure Software Attestation

Software attestation has become a popular and challenging research topic at many established security conferences. It aims for verifying the software integrity of (typically) resource-constrained embedded devices. However, for practical reasons, software attestation cannot rely on stored cryptographic secrets or dedicated trusted hardware. Instead, it exploits side-channel information, such as ...

متن کامل

Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions

Remote attestation mechanisms are well studied in the highend computing environments; however, the same is not true for embedded devices especially for smart cards. With ever changing landscape of smart card technology and advancements towards a true multiapplication platform, verifying the current state of the smart card is signi cant to the overall security of such proposals. The initiatives ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004