A framework for defending embedded systems against software attacks

The incidence of malicious code and software vulnerability exploits on embedded platforms is constantly on the rise. Yet, little effort is being devoted to combating such threats to embedded systems. Moreover, adapting security approaches designed for general-purpose systems generally fails because...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACM transactions on embedded computing systems 2011-04, Vol.10 (3), p.1-23
Hauptverfasser: Aaraj, Najwa, Raghunathan, Anand, Jha, Niraj K.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 23
container_issue 3
container_start_page 1
container_title ACM transactions on embedded computing systems
container_volume 10
creator Aaraj, Najwa
Raghunathan, Anand
Jha, Niraj K.
description The incidence of malicious code and software vulnerability exploits on embedded platforms is constantly on the rise. Yet, little effort is being devoted to combating such threats to embedded systems. Moreover, adapting security approaches designed for general-purpose systems generally fails because of the limited processing capabilities of their embedded counterparts. In this work, we evaluate a malware and software vulnerability exploit defense framework for embedded systems. The proposed framework extends our prior work, which defines two isolated execution environments: a testing environment, wherein an untrusted application is first tested using dynamic binary instrumentation (DBI), and a real environment, wherein a program is monitored at runtime using an extracted behavioral model, along with a continuous learning process. We present a suite of software and hardware optimizations to reduce the overheads induced by the defense framework on embedded systems. Software optimizations include the usage of static analysis, complemented with DBI in the testing environment (i.e., a hybrid software analysis approach is used). Hardware optimizations exploit parallel processing capabilities of multiprocessor systems-on-chip. We have evaluated the defense framework and proposed optimizations on the ARM-Linux operating system. Experiments demonstrate that our framework achieves a high coverage of considered security threats, with acceptable performance penalties (the average execution time of applications goes up to 1.68X, considering all optimizations, which is much smaller than the 2.72X performance penalty when no optimizations are used).
doi_str_mv 10.1145/1952522.1952526
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_901655332</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>901655332</sourcerecordid><originalsourceid>FETCH-LOGICAL-c273t-e5892d6551ca04b0489e2ca962af09c2761a08315ff937bfec2ef4130d2515963</originalsourceid><addsrcrecordid>eNotkDtvwjAURq2qlUpp567eOgX8yHXiEaG-JKQu7RwZ-xqlkIT6GiH-fUFhOt9wdIaPsWcpZlKWMJcWFCg1G2lu2EQC1IUuDdxetraFFXV1zx6IfoWQlSphwpYLHpPr8DikLY9D4gEj9qHtNxy7NYaAgdOJMnbE3ca1PWVOQ8xHl5C7nJ3f0iO7i25H-HTllP28vX4vP4rV1_vncrEqvKp0LhBqq4IBkN6Jci3K2qLyzhrlorBnx0gnai0hRqurdUSvMJZSi6BAgjV6yl7G7j4Nfwek3HQtedztXI_DgRor5LmutTqb89H0aSBKGJt9ajuXTo0UzeWt5vrWlUb_A547W-Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>901655332</pqid></control><display><type>article</type><title>A framework for defending embedded systems against software attacks</title><source>ACM Digital Library</source><creator>Aaraj, Najwa ; Raghunathan, Anand ; Jha, Niraj K.</creator><creatorcontrib>Aaraj, Najwa ; Raghunathan, Anand ; Jha, Niraj K.</creatorcontrib><description>The incidence of malicious code and software vulnerability exploits on embedded platforms is constantly on the rise. Yet, little effort is being devoted to combating such threats to embedded systems. Moreover, adapting security approaches designed for general-purpose systems generally fails because of the limited processing capabilities of their embedded counterparts. In this work, we evaluate a malware and software vulnerability exploit defense framework for embedded systems. The proposed framework extends our prior work, which defines two isolated execution environments: a testing environment, wherein an untrusted application is first tested using dynamic binary instrumentation (DBI), and a real environment, wherein a program is monitored at runtime using an extracted behavioral model, along with a continuous learning process. We present a suite of software and hardware optimizations to reduce the overheads induced by the defense framework on embedded systems. Software optimizations include the usage of static analysis, complemented with DBI in the testing environment (i.e., a hybrid software analysis approach is used). Hardware optimizations exploit parallel processing capabilities of multiprocessor systems-on-chip. We have evaluated the defense framework and proposed optimizations on the ARM-Linux operating system. Experiments demonstrate that our framework achieves a high coverage of considered security threats, with acceptable performance penalties (the average execution time of applications goes up to 1.68X, considering all optimizations, which is much smaller than the 2.72X performance penalty when no optimizations are used).</description><identifier>ISSN: 1539-9087</identifier><identifier>EISSN: 1558-3465</identifier><identifier>DOI: 10.1145/1952522.1952526</identifier><language>eng</language><subject>Computer programs ; Embedded computer systems ; Incidence ; Platforms ; Security ; Software</subject><ispartof>ACM transactions on embedded computing systems, 2011-04, Vol.10 (3), p.1-23</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c273t-e5892d6551ca04b0489e2ca962af09c2761a08315ff937bfec2ef4130d2515963</citedby><cites>FETCH-LOGICAL-c273t-e5892d6551ca04b0489e2ca962af09c2761a08315ff937bfec2ef4130d2515963</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Aaraj, Najwa</creatorcontrib><creatorcontrib>Raghunathan, Anand</creatorcontrib><creatorcontrib>Jha, Niraj K.</creatorcontrib><title>A framework for defending embedded systems against software attacks</title><title>ACM transactions on embedded computing systems</title><description>The incidence of malicious code and software vulnerability exploits on embedded platforms is constantly on the rise. Yet, little effort is being devoted to combating such threats to embedded systems. Moreover, adapting security approaches designed for general-purpose systems generally fails because of the limited processing capabilities of their embedded counterparts. In this work, we evaluate a malware and software vulnerability exploit defense framework for embedded systems. The proposed framework extends our prior work, which defines two isolated execution environments: a testing environment, wherein an untrusted application is first tested using dynamic binary instrumentation (DBI), and a real environment, wherein a program is monitored at runtime using an extracted behavioral model, along with a continuous learning process. We present a suite of software and hardware optimizations to reduce the overheads induced by the defense framework on embedded systems. Software optimizations include the usage of static analysis, complemented with DBI in the testing environment (i.e., a hybrid software analysis approach is used). Hardware optimizations exploit parallel processing capabilities of multiprocessor systems-on-chip. We have evaluated the defense framework and proposed optimizations on the ARM-Linux operating system. Experiments demonstrate that our framework achieves a high coverage of considered security threats, with acceptable performance penalties (the average execution time of applications goes up to 1.68X, considering all optimizations, which is much smaller than the 2.72X performance penalty when no optimizations are used).</description><subject>Computer programs</subject><subject>Embedded computer systems</subject><subject>Incidence</subject><subject>Platforms</subject><subject>Security</subject><subject>Software</subject><issn>1539-9087</issn><issn>1558-3465</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNotkDtvwjAURq2qlUpp567eOgX8yHXiEaG-JKQu7RwZ-xqlkIT6GiH-fUFhOt9wdIaPsWcpZlKWMJcWFCg1G2lu2EQC1IUuDdxetraFFXV1zx6IfoWQlSphwpYLHpPr8DikLY9D4gEj9qHtNxy7NYaAgdOJMnbE3ca1PWVOQ8xHl5C7nJ3f0iO7i25H-HTllP28vX4vP4rV1_vncrEqvKp0LhBqq4IBkN6Jci3K2qLyzhrlorBnx0gnai0hRqurdUSvMJZSi6BAgjV6yl7G7j4Nfwek3HQtedztXI_DgRor5LmutTqb89H0aSBKGJt9ajuXTo0UzeWt5vrWlUb_A547W-Q</recordid><startdate>201104</startdate><enddate>201104</enddate><creator>Aaraj, Najwa</creator><creator>Raghunathan, Anand</creator><creator>Jha, Niraj K.</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201104</creationdate><title>A framework for defending embedded systems against software attacks</title><author>Aaraj, Najwa ; Raghunathan, Anand ; Jha, Niraj K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c273t-e5892d6551ca04b0489e2ca962af09c2761a08315ff937bfec2ef4130d2515963</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer programs</topic><topic>Embedded computer systems</topic><topic>Incidence</topic><topic>Platforms</topic><topic>Security</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Aaraj, Najwa</creatorcontrib><creatorcontrib>Raghunathan, Anand</creatorcontrib><creatorcontrib>Jha, Niraj K.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM transactions on embedded computing systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Aaraj, Najwa</au><au>Raghunathan, Anand</au><au>Jha, Niraj K.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A framework for defending embedded systems against software attacks</atitle><jtitle>ACM transactions on embedded computing systems</jtitle><date>2011-04</date><risdate>2011</risdate><volume>10</volume><issue>3</issue><spage>1</spage><epage>23</epage><pages>1-23</pages><issn>1539-9087</issn><eissn>1558-3465</eissn><abstract>The incidence of malicious code and software vulnerability exploits on embedded platforms is constantly on the rise. Yet, little effort is being devoted to combating such threats to embedded systems. Moreover, adapting security approaches designed for general-purpose systems generally fails because of the limited processing capabilities of their embedded counterparts. In this work, we evaluate a malware and software vulnerability exploit defense framework for embedded systems. The proposed framework extends our prior work, which defines two isolated execution environments: a testing environment, wherein an untrusted application is first tested using dynamic binary instrumentation (DBI), and a real environment, wherein a program is monitored at runtime using an extracted behavioral model, along with a continuous learning process. We present a suite of software and hardware optimizations to reduce the overheads induced by the defense framework on embedded systems. Software optimizations include the usage of static analysis, complemented with DBI in the testing environment (i.e., a hybrid software analysis approach is used). Hardware optimizations exploit parallel processing capabilities of multiprocessor systems-on-chip. We have evaluated the defense framework and proposed optimizations on the ARM-Linux operating system. Experiments demonstrate that our framework achieves a high coverage of considered security threats, with acceptable performance penalties (the average execution time of applications goes up to 1.68X, considering all optimizations, which is much smaller than the 2.72X performance penalty when no optimizations are used).</abstract><doi>10.1145/1952522.1952526</doi><tpages>23</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1539-9087
ispartof ACM transactions on embedded computing systems, 2011-04, Vol.10 (3), p.1-23
issn 1539-9087
1558-3465
language eng
recordid cdi_proquest_miscellaneous_901655332
source ACM Digital Library
subjects Computer programs
Embedded computer systems
Incidence
Platforms
Security
Software
title A framework for defending embedded systems against software attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T16%3A04%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20framework%20for%20defending%20embedded%20systems%20against%20software%20attacks&rft.jtitle=ACM%20transactions%20on%20embedded%20computing%20systems&rft.au=Aaraj,%20Najwa&rft.date=2011-04&rft.volume=10&rft.issue=3&rft.spage=1&rft.epage=23&rft.pages=1-23&rft.issn=1539-9087&rft.eissn=1558-3465&rft_id=info:doi/10.1145/1952522.1952526&rft_dat=%3Cproquest_cross%3E901655332%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=901655332&rft_id=info:pmid/&rfr_iscdi=true