H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices
Title | H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Zhang, Z., Li, Z., Xia, C., Cui, J., Ma, J. |
Conference Name | 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) |
Publisher | IEEE |
ISBN Number | 978-1-5386-4210-8 |
Keywords | ARM hardware virtualization technique, ARM Hypervisor, composability, data privacy, Embedded systems, H-Securebox system, hardened memory data protection framework, Hardware, Human Behavior, hypervisor privilege, Internet of Things, IoT devices, Kernel, kernel level attack, kernel privilege, kernel-level memory data, low power consumption, memory data protection strategies, Metrics, microprocessor chips, operating system kernels, privacy, private data, pubcrawl, Resiliency, security, smart phones, types H-Securebox, Virtual machine monitors, virtual machines, virtualisation, virtualization, virtualization privacy |
Abstract | ARM devices (mobile phone, IoT devices) are getting more popular in our daily life due to the low power consumption and cost. These devices carry a huge number of user's private information, which attracts attackers' attention and increase the security risk. The operating systems (e.g., Android, Linux) works out many memory data protection strategies on user's private information. However, the monolithic OS may contain security vulnerabilities that are exploited by the attacker to get root or even kernel privilege. Once the kernel privilege is obtained by the attacker, all data protection strategies will be gone and user's private information can be taken away. In this paper, we propose a hardened memory data protection framework called H-Securebox to defeat kernel-level memory data stolen attacks. H-Securebox leverages ARM hardware virtualization technique to protect the data on the memory with hypervisor privilege. We designed three types H-Securebox for programing developers to use. Although the attacker may have kernel privilege, she can not touch private data inside H-Securebox, since hypervisor privilege is higher than kernel privilege. With the implementation of H-Securebox system assisting by a tiny hypervisor on Raspberry Pi2 development board, we measure the performance overhead of our system and do the security evaluations. The results positively show that the overhead is negligible and the malicious application with root or kernel privilege can not access the private data protected by our system. |
URL | https://ieeexplore.ieee.org/document/8411874 |
DOI | 10.1109/DSC.2018.00053 |
Citation Key | zhang_h-securebox:_2018 |
- security
- memory data protection strategies
- Metrics
- microprocessor chips
- operating system kernels
- privacy
- private data
- pubcrawl
- Resiliency
- low power consumption
- smart phones
- types H-Securebox
- Virtual machine monitors
- virtual machines
- virtualisation
- Virtualization
- virtualization privacy
- ARM hardware virtualization technique
- kernel-level memory data
- kernel privilege
- kernel level attack
- Kernel
- IoT devices
- Internet of Things
- hypervisor privilege
- Human behavior
- Hardware
- hardened memory data protection framework
- H-Securebox system
- embedded systems
- data privacy
- composability
- ARM Hypervisor