Visible to the public H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices

TitleH-Securebox: A Hardened Memory Data Protection Framework on ARM Devices
Publication TypeConference Paper
Year of Publication2018
AuthorsZhang, Z., Li, Z., Xia, C., Cui, J., Ma, J.
Conference Name2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)
PublisherIEEE
ISBN Number978-1-5386-4210-8
KeywordsARM hardware virtualization technique, ARM Hypervisor, composability, data privacy, Embedded systems, H-Securebox system, hardened memory data protection framework, Hardware, Human Behavior, hypervisor privilege, Internet of Things, IoT devices, Kernel, kernel level attack, kernel privilege, kernel-level memory data, low power consumption, memory data protection strategies, Metrics, microprocessor chips, operating system kernels, privacy, private data, pubcrawl, Resiliency, security, smart phones, types H-Securebox, Virtual machine monitors, virtual machines, virtualisation, virtualization, virtualization privacy
Abstract

ARM devices (mobile phone, IoT devices) are getting more popular in our daily life due to the low power consumption and cost. These devices carry a huge number of user's private information, which attracts attackers' attention and increase the security risk. The operating systems (e.g., Android, Linux) works out many memory data protection strategies on user's private information. However, the monolithic OS may contain security vulnerabilities that are exploited by the attacker to get root or even kernel privilege. Once the kernel privilege is obtained by the attacker, all data protection strategies will be gone and user's private information can be taken away. In this paper, we propose a hardened memory data protection framework called H-Securebox to defeat kernel-level memory data stolen attacks. H-Securebox leverages ARM hardware virtualization technique to protect the data on the memory with hypervisor privilege. We designed three types H-Securebox for programing developers to use. Although the attacker may have kernel privilege, she can not touch private data inside H-Securebox, since hypervisor privilege is higher than kernel privilege. With the implementation of H-Securebox system assisting by a tiny hypervisor on Raspberry Pi2 development board, we measure the performance overhead of our system and do the security evaluations. The results positively show that the overhead is negligible and the malicious application with root or kernel privilege can not access the private data protected by our system.

URLhttps://ieeexplore.ieee.org/document/8411874
DOI10.1109/DSC.2018.00053
Citation Keyzhang_h-securebox:_2018