Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems 2022
DOI: 10.1145/3503222.3507768
|View full text |Cite
|
Sign up to set email alerts
|

One size does not fit all: security hardening of MIPS embedded systems via static binary debloating for shared libraries

Abstract: Embedded systems have become prominent targets for cyberattacks. To exploit firmware's memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the large shared library codebase (e.g., uClibc). Unfortunately, unlike their desktop counterparts, embedded systems lack essential computing resources to enforce security hardening techniques. Recently, we have witnessed a surge of software debloating as a new defense mechanism against code-reuse attacks; it erases unused code to significan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 45 publications
0
5
0
Order By: Relevance
“…Similarly, Cui et al [57] propose ABSR as an early conceptual ideal firmware codedebloating technique achieved via binary-patching and binaryrewriting. Recently, Zhang et al [80] presented µTrimmer, a system to identify and remove unused basic blocks from binary code of shared libraries and tools. The authors implemented µTrimmer for the MIPS architecture (a very common one for IoT devices), and tested its effectiveness on SPEC CPU2017 benchmarks, popular firmware applications (e.g.,…”
Section: A Retrofitting Patching and Hardening For Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, Cui et al [57] propose ABSR as an early conceptual ideal firmware codedebloating technique achieved via binary-patching and binaryrewriting. Recently, Zhang et al [80] presented µTrimmer, a system to identify and remove unused basic blocks from binary code of shared libraries and tools. The authors implemented µTrimmer for the MIPS architecture (a very common one for IoT devices), and tested its effectiveness on SPEC CPU2017 benchmarks, popular firmware applications (e.g.,…”
Section: A Retrofitting Patching and Hardening For Securitymentioning
confidence: 99%
“…[57] Proposes ABSR, a technique to disable unused firmware features and remove unused binary files. [80] Introduces a system to identify and remove unused basic blocks from the binary code of shared libraries. [81] Designs WebDroid, a framework for building secure embedded web interfaces.…”
Section: Categorymentioning
confidence: 99%
“…Software debloating is currently emerging as a widely adopted technique for security hardening by reducing attack surfaces in code -removing unused pieces of code. µTrimmer [44], designed for MIPS firmware, eliminates unwanted basic blocks in shared libraries. JSLIM [42] is another debloating framework to remove dead code and code containing vulnerabilities in JavaScript applications.…”
Section: B Code-based Debloatingmentioning
confidence: 99%
“…Code generated by static translation methods usually exhibits high-quality and high-execution efficiency. However, static translation methods require an independent interpreter to execute the statically translated code blocks and cannot address the issues of self-modifying code, code mining, and precise interruptions [5][6][7][8][9][10]. Dynamic translation methods translate and execute the target code at the same time, and the translation activity occupies the program's execution time.…”
Section: Overviewmentioning
confidence: 99%