Using Software-based Attestation for Verifying Embedded Systems in Cars
نویسندگان
چکیده
With advances in automobile electronics, we find a rapid proliferation of embedded systems in cars, both in safety-critical applications and for passenger comfort. These embedded systems are increasingly networked for their operation and enhanced functionality. However, the increased connectivity of embedded systems also greatly complicates design, increases the number of failure modes, and introduces the risk of remote malicious attacks, such as worms and viruses. Moreover, car owners may alter the code on their car to access features they did not pay for or achieve higher motor performance. Such owner-initiated changes are likely to deteriorate the car’s safety. We propose SWATT, a SoftWare-based ATTestation mechanism to detect and defend against these threats. SWATT enables an external verifier to verify the code of a running system to detect maliciously inserted or altered code. So far, code attestation has been proposed as a mechanism to verify the code running on a system, and special hardware mechanisms have been designed to achieve this property, e.g., TCG (formerly known as TCPA) [15] and NGSCB (formerly known as Palladium) [6]. However, special hardware to provide attestation may not be available in legacy systems or due to cost reasons. Therefore, we design SWATT to be software-based. Code attestation is instrumental to many applications, such as remote detection of malicious code (such as Trojan horses and viruses) in embedded systems and gives an assurance that critical embedded systems are running the correct code. If we use SWATT to verify code running on embedded systems in a car, an attacker is forced to perform a hardware change to hide the presence of altered code; greatly increasing the effort required by an attacker and preventing entire classes of remote attacks.
منابع مشابه
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previously proposed remote attestation techniques assisted by specialized secure hardware are effective, they not yet viable for low-cost embedded devices. One notable alternative is software-based attestation, that is both...
متن کاملSimHAT: Simulated Hardware-based Attestation evaluation Tool
Embedded devices have come to play an important role in our daily lives. Increasingly, diverse fields like healthcare systems, banks and more are using these devices to automate underlying complex tasks. This reliance has led to a significant development – exposure of devices to malicious attacks, including control and subversion of software onboard. Software attestation has been herald as a so...
متن کاملPractical Analysis Framework for Software-Based Attestation Scheme
An increasing number of "smart" embedded devices are employed in our living environment nowadays. Unlike traditional computer systems, these devices are often physically accessible to the attackers. It is therefore almost impossible to guarantee that they are un-compromised, i.e., that indeed the devices are executing the intended software. In such a context, software-based attestation is deeme...
متن کاملTowards Provably Secure Software Attestation
Software attestation has become a popular and challenging research topic at many established security conferences. It aims for verifying the software integrity of (typically) resource-constrained embedded devices. However, for practical reasons, software attestation cannot rely on stored cryptographic secrets or dedicated trusted hardware. Instead, it exploits side-channel information, such as ...
متن کاملRemote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions
Remote attestation mechanisms are well studied in the highend computing environments; however, the same is not true for embedded devices especially for smart cards. With ever changing landscape of smart card technology and advancements towards a true multiapplication platform, verifying the current state of the smart card is signi cant to the overall security of such proposals. The initiatives ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004