2010 NASA/ESA Conference on Adaptive Hardware and Systems 2010
DOI: 10.1109/ahs.2010.5546254
|View full text |Cite
|
Sign up to set email alerts
|

Embedded system protection from software corruption

Abstract: As Embedded Systems are being network enabled, allowing for remote updates and data sharing, software corruption has become a major concern. Security protection has mostly been overlooked. Software corruption can simplistically be considered as unauthorized instructions that are executed within the system. This can occur through behaviorally modified instruction code introduced via new software installation, updates, or application input data (such as buffer overflows). We introduce a vault architecture that p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Since the normal world has rich services and interfaces which enlarge the attack surface and lacks sufficient security protection, attackers can compromise the embedded device by utilizing software and hardware vulnerabilities and obtain permission to operate the file system, including reading, writing, and modifying database files. Moreover, an attacker can even obtain a higher privilege (e.g., root permission of the rich OS) to control the execution of the application by accessing the code and data segments of the running process via memory-oriented attacks, such as memory corruption attacks (MCA) [16], [17], [18], [19]. We summarize the threats to the embedded database system in two aspects: confidentiality and integrity.…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the normal world has rich services and interfaces which enlarge the attack surface and lacks sufficient security protection, attackers can compromise the embedded device by utilizing software and hardware vulnerabilities and obtain permission to operate the file system, including reading, writing, and modifying database files. Moreover, an attacker can even obtain a higher privilege (e.g., root permission of the rich OS) to control the execution of the application by accessing the code and data segments of the running process via memory-oriented attacks, such as memory corruption attacks (MCA) [16], [17], [18], [19]. We summarize the threats to the embedded database system in two aspects: confidentiality and integrity.…”
Section: Threat Modelmentioning
confidence: 99%
“…However, this approach can only protect data in storage since the encrypted data needs to be restored to the plaintext before use. In this case, an attacker can easily obtain plaintext data from memory via memory-oriented attacks, such as MCAs [16], [17], [18], [19]. Figure 9-A shows such a scheme.…”
Section: Ciphertext Data Storage (Cds)mentioning
confidence: 99%
“…In the current security mechanisms hash function is used to check program and data integrity, so program and data information is threatened by security attacks [9]. In order to prevent security attacks, to improve the computational difficulty of the hash function is an effective method for prevention of rainbow table attack due to the generating process of rainbow table.…”
Section: Prevention Of Hash Attacksmentioning
confidence: 99%
“…Solutions based on hardware monitors have been also proposed. Wolff et al [34] presents a vault architecture for embedded systems to prevent the insertion of software corruptions, while Arora et. al [35] proposes a systematic methodology to design application-specific hardware monitors for any given embedded program.…”
Section: Related Workmentioning
confidence: 99%