当前位置: X-MOL 学术arXiv.cs.AR › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution
arXiv - CS - Hardware Architecture Pub Date : 2020-11-14 , DOI: arxiv-2011.07400
Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Gene Tsudik

The design of tiny trust anchors has received significant attention over the past decade, to secure low-end MCU-s that cannot afford expensive security mechanisms. In particular, hardware/software (hybrid) co-designs offer low hardware cost, while retaining similar security guarantees as (more expensive) hardware-based techniques. Hybrid trust anchors support security services, such as remote attestation, proofs of software update/erasure/reset, proofs of remote software execution, in resource-constrained MCU-s, e.g., MSP430 and AVR AtMega32. Despite these advances, detection of control-flow attacks in low-end MCU-s remains a challenge, since hardware requirements of the cheapest related architectures are often more expensive than the MCU-s themselves. In this work, we tackle this challenge by designing Tiny-CFA - a control-flow attestation (CFA) technique with a single hardware requirement - the ability to generate proofs of remote software execution (PoX). In turn, PoX can be implemented very efficiently and securely in low-end MCU-s. Consequently, our design achieves the lowest hardware overhead of any CFA architecture (i.e., two orders of magnitude cheaper), while relying on a formally verified PoX architecture as its sole hardware requirement. With respect to runtime overhead, Tiny-CFA also achieves better performance than prior CFA techniques based on code instrumentation. We implement and evaluate Tiny-CFA, analyze its security, and demonstrate its practicality using real-world publicly available applications.

中文翻译:

Tiny-CFA:使用经过验证的执行证明进行控制流证明的简约方法

在过去十年中,微型信任锚的设计受到了极大的关注,以保护无法负担昂贵安全机制的低端 MCU。特别是,硬件/软件(混合)协同设计提供较低的硬件成本,同时保留与(更昂贵的)基于硬件的技术类似的安全保证。混合信任锚在资源受限的 MCU 中支持安全服务,例如远程证明、软件更新/擦除/重置证明、远程软件执行证明,例如 MSP430 和 AVR AtMega32。尽管取得了这些进步,检测低端 MCU 中的控制流攻击仍然是一个挑战,因为最便宜的相关架构的硬件要求通常比 MCU 本身更昂贵。在这项工作中,我们通过设计 Tiny-CFA——一种具有单一硬件要求的控制流证明 (CFA) 技术——能够生成远程软件执行 (PoX) 的证明来应对这一挑战。反过来,PoX 可以在低端 MCU 中非常高效和安全地实施。因此,我们的设计实现了任何 CFA 架构的最低硬件开销(即便宜两个数量级),同时依赖正式验证的 PoX 架构作为其唯一的硬件要求。在运行时开销方面,Tiny-CFA 还实现了比以前基于代码检测的 CFA 技术更好的性能。我们实施和评估 Tiny-CFA,分析其安全性,并使用现实世界的公开可用应用程序证明其实用性。我们的设计实现了任何 CFA 架构中最低的硬件开销(即便宜两个数量级),同时依赖正式验证的 PoX 架构作为其唯一的硬件要求。在运行时开销方面,Tiny-CFA 还实现了比以前基于代码检测的 CFA 技术更好的性能。我们实施和评估 Tiny-CFA,分析其安全性,并使用现实世界的公开可用应用程序证明其实用性。我们的设计实现了任何 CFA 架构中最低的硬件开销(即便宜两个数量级),同时依赖正式验证的 PoX 架构作为其唯一的硬件要求。在运行时开销方面,Tiny-CFA 还实现了比以前基于代码检测的 CFA 技术更好的性能。我们实施和评估 Tiny-CFA,分析其安全性,并使用现实世界的公开可用应用程序证明其实用性。
更新日期:2020-11-17
down
wechat
bug