Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

07/05/2020
by   Ali Abbasi, et al.
0

Memory corruption vulnerabilities have been around for decades and rank among the most prevalent vulnerabilities in embedded systems. Yet this constrained environment poses unique design and implementation challenges that significantly complicate the adoption of common hardening techniques. Combined with the irregular and involved nature of embedded patch management, this results in prolonged vulnerability exposure windows and vulnerabilities that are relatively easy to exploit. Considering the sensitive and critical nature of many embedded systems, this situation merits significant improvement. In this work, we present the first quantitative study of exploit mitigation adoption in 42 embedded operating systems, showing the embedded world to significantly lag behind the general-purpose world. To improve the security of deeply embedded systems, we subsequently present μArmor, an approach to address some of the key gaps identified in our quantitative analysis. μArmor raises the bar for exploitation of embedded memory corruption vulnerabilities, while being adoptable on the short term without incurring prohibitive extra performance or storage costs.

READ FULL TEXT
research
02/27/2023

Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights

The number of disclosed vulnerabilities has been steadily increasing ove...
research
03/14/2023

Half-Day Vulnerabilities: A study of the First Days of CVE Entries

The National Vulnerability Disclosure Database is an invaluable source o...
research
05/24/2019

SpecFuzz: Bringing Spectre-type vulnerabilities to the surface

SpecFuzz is the first tool that enables dynamic testing for speculative ...
research
07/03/2018

RUMA: On the Analysis of Defenses based on Misaligned Accesses

The adoption of randomness against heap layout has rendered a good porti...
research
08/13/2020

Déjà Vu: Side-Channel Analysis of Mozilla's NSS

Recent work on Side Channel Analysis (SCA) targets old, well-known vulne...
research
09/12/2022

Bao-Enclave: Virtualization-based Enclaves for Arm

General-purpose operating systems (GPOS), such as Linux, encompass sever...
research
03/14/2022

Building Embedded Systems Like It's 1996

Embedded devices are ubiquitous. However, preliminary evidence shows tha...

Please sign up or login with your details

Forgot password? Click here to reset