首页> 外文会议>Design, Automation Test in Europe Conference Exhibition >uSFI: Ultra-lightweight software fault isolation for IoT-class devices
【24h】

uSFI: Ultra-lightweight software fault isolation for IoT-class devices

机译:USFI:IOT-Class设备的超轻型软件故障隔离

获取原文

摘要

Embedded device security is a particularly difficult challenge, as the quantity of devices makes them attractive targets, while their cost-sensitive design leads to less-than-desirable security implementations. Most current low-end embedded devices do not include any form of security or only include simple memory protection support. One line of research in crafting low-cost security for low-end embedded devices has focused on sand-boxing trusted code from untrusted code using both hardware and software techniques. These previous attempts suffer from large trusted code bases (e.g., including the entire kernel), high runtime overheads (e.g., due to code instrumentation), partial protection (e.g., only provide write protection), or heavyweight hardware modifications. In this work, we leverage the rudimentary memory protection support found in modern IoT-class microcontrollers to build a low-profile, low-overhead, flexible sandboxing mechanism that can provide isolation between tightly-coupled software modules. With our approach, named uSFI, only the trust management code must be trusted. Through the use of a static verifier and monitored inter-module transitions, module code at all privilege levels (including the kernel) is able to run uninstrumented and untrusted code. We implemented uSFI on an ARMv7-M based processor, both bare metal and running the freeRTOS kernel, and analyzed the performance using the MiBench embedded benchmark suite and two additional highly detailed applications. We found that performance overheads were minimal, with at most 1.1% slowdown, and code size overheads were also low, at a maximum of 10%. In addition, our trusted code base is trivially small at only 150 lines of code.
机译:嵌入式设备安全性是一个特别困难的挑战,因为设备的数量使得它们具有吸引力的目标,而其成本敏感的设计导致不太理想的安全实现。大多数当前的低端嵌入式设备不包括任何形式的安全性,或者仅包括简单的内存保护支持。用于低端嵌入式设备的低成本安全性的一系列研究专注于使用硬件和软件技术从不受信任的代码的沙箱信任代码。这些以前的尝试遭受大型可信代码基础(例如,包括整个内核),高运行时开销(例如,由于代码仪器),部分保护(例如,仅提供写保护)或重量级硬件修改。在这项工作中,我们利用现代物联网微控制器中发现的基本内存保护支持,以构建低调,低开销,灵活的沙箱机制,可以在紧密耦合的软件模块之间提供隔离。通过我们的方法,名为USFI,只有信任管理代码必须信任。通过使用静态验证器并监视模块间转换,所有特权级别(包括内核)处的模块代码能够运行unInstrumented和不受信任的代码。我们在基于ARMv7-M的处理器上实现了USFI,裸机和运行Freertos内核,并使用Mibench嵌入式基准套件和两种额外的高度详细应用分析了性能。我们发现性能开销最小,最多1.1 %放缓,并且代码大小开销也低,最多10 %。此外,我们可信代码库在仅为150行代码中史无众不可。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号