A TOCTOU Attack on DICE Attestation

01/27/2022
by   Stefan Hristozov, et al.
0

A major security challenge for modern Internet of Things (IoT) deployments is to ensure that the devices run legitimate firmware free from malware. This challenge can be addressed through a security primitive called attestation which allows a remote backend to verify the firmware integrity of the devices it manages. In order to accelerate broad attestation adoption in the IoT domain the Trusted Computing Group (TCG) has introduced the Device Identifier Composition Engine (DICE) series of specifications. DICE is a hardware-software architecture for constrained, e.g., microcontroller-based IoT devices where the firmware is divided into successively executed layers. In this paper, we demonstrate a remote Time-Of-Check Time-Of-Use (TOCTOU) attack on DICE-based attestation. We demonstrate that it is possible to install persistent malware in the flash memory of a constrained microcontroller that cannot be detected through DICE-based attestation. The main idea of our attack is to install malware during runtime of application logic in the top firmware layer. The malware reads the valid attestation key and stores it on the device's flash memory. After reboot, the malware uses the previously stored key for all subsequent attestations to the backend. We conduct the installation of malware and copying of the key through Return-Oriented Programming (ROP). As a platform for our demonstration, we use the Cortex-M-based nRF52840 microcontroller. We provide a discussion of several possible countermeasures which can mitigate the shortcomings of the DICE specifications.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/12/2020

On Runtime Software Security of TrustZone-M based IoT Devices

Internet of Things (IoT) devices have been increasingly integrated into ...
research
02/10/2019

Analyzing Endpoints in the Internet of Things Malware

The lack of security measures in the Internet of Things (IoT) devices an...
research
07/03/2020

DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis

Microcontroller-based embedded devices are at the core of Internet-of-Th...
research
07/27/2020

Testing And Hardening IoT Devices Against the Mirai Botnet

A large majority of cheap Internet of Things (IoT) devices that arrive b...
research
01/26/2023

Synesthetic Dice: Sensors, Actuators, And Mappings

How bright can you cry? How loud does the sun shine? We developed a mult...
research
08/07/2022

IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures

IoT technology has been developing rapidly, while at the same time, it r...
research
07/29/2020

Towards a Backdoorless Network Architecture Based on Remote Attestation and Backdoor Inspection

To keep a system secure, all devices in the system need to be benign. To...

Please sign up or login with your details

Forgot password? Click here to reset