Challenges in Designing Exploit Mitigations for Deeply Embedded Systems
Title | Challenges in Designing Exploit Mitigations for Deeply Embedded Systems |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Abbasi, Ali, Wetzels, Jos, Holz, Thorsten, Etalle, Sandro |
Conference Name | 2019 IEEE European Symposium on Security and Privacy (EuroS P) |
Date Published | jun |
Keywords | common hardening techniques, composability, deeply embedded systems, embedded memory corruption vulnerabilities, embedded operating systems, embedded patch management, embedded system, Embedded systems, exploit mitigation, Exploiting, Hardware, Linux, Linux Operating System Security, Metrics, operating systems (computers), Predictive Metrics, pubcrawl, Real-time Systems, Resiliency, security, security of data, statistical analysis, vulnerability exposure windows, μArmor approach |
Abstract | Memory corruption vulnerabilities have been around for decades and rank among the most prevalent vulnerabilities in embedded systems. Yet this constrained environment poses unique design and implementation challenges that significantly complicate the adoption of common hardening techniques. Combined with the irregular and involved nature of embedded patch management, this results in prolonged vulnerability exposure windows and vulnerabilities that are relatively easy to exploit. Considering the sensitive and critical nature of many embedded systems, this situation merits significant improvement. In this work, we present the first quantitative study of exploit mitigation adoption in 42 embedded operating systems, showing the embedded world to significantly lag behind the general-purpose world. To improve the security of deeply embedded systems, we subsequently present mArmor, an approach to address some of the key gaps identified in our quantitative analysis. mArmor raises the bar for exploitation of embedded memory corruption vulnerabilities, while being adoptable on the short term without incurring prohibitive extra performance or storage costs. |
DOI | 10.1109/EuroSP.2019.00013 |
Citation Key | abbasi_challenges_2019 |
- Hardware
- μArmor approach
- vulnerability exposure windows
- statistical analysis
- security of data
- security
- Resiliency
- real-time systems
- pubcrawl
- operating systems (computers)
- Metrics
- Linux
- Linux Operating System Security
- Exploiting
- exploit mitigation
- embedded systems
- Embedded System
- embedded patch management
- embedded operating systems
- embedded memory corruption vulnerabilities
- deeply embedded systems
- composability
- common hardening techniques
- Predictive Metrics