Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA

05/05/2022
by   Ivan De Oliveira Nunes, et al.
0

There are many well-known techniques to secure sensed data in IoT/CPS systems, e.g., by authenticating communication end-points, encrypting data before transmission, and obfuscating traffic patterns. Such techniques protect sensed data from external adversaries while assuming that the sensing device itself is secure. Meanwhile, both the scale and frequency of IoT-focused attacks are growing. This prompts a natural question: how to protect sensed data even if all software on the device is compromised? Ideally, in order to achieve this, sensed data must be protected from its genesis, i.e., from the time when a physical analog quantity is converted into its digital counterpart and becomes accessible to software. We refer to this property as PfB: Privacy-from-Birth. In this work, we formalize PfB and design Verified Remote Sensing Authorization (VERSA) – a provably secure and formally verified architecture guaranteeing that only correct execution of expected and explicitly authorized software can access and manipulate sensing interfaces, specifically, General Purpose Input/Output (GPIO), which is the usual boundary between analog and digital worlds on IoT devices. This guarantee is obtained with minimal hardware support and holds even if all device software is compromised. VERSA ensures that malware can neither gain access to sensed data on the GPIO-mapped memory nor obtain any trace thereof. VERSA is formally verified and its open-sourced implementation targets resource-constrained IoT edge devices, commonly used for sensing. Experimental results show that PfB is both achievable and affordable for such devices.

READ FULL TEXT
research
10/18/2020

DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding

The onboarding of IoT devices by authorized users constitutes both a cha...
research
05/06/2021

Remote Attestation: A Literature Review

With the rising number of IoT devices, the security of such devices beco...
research
04/19/2021

The Impact of DoS Attacks onResource-constrained IoT Devices:A Study on the Mirai Attack

Mirai is a type of malware that creates a botnet of internet-connected d...
research
05/08/2020

On the TOCTOU Problem in Remote Attestation

We propose Remote Attestation with TOCTOU Avoidance (RATA): a provably s...
research
09/07/2023

Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence (Full Version)

As many types of IoT devices worm their way into numerous settings and m...
research
04/26/2020

Airmed: Efficient Self-Healing Network of Low-End Devices

The proliferation of application specific cyber-physical systems coupled...
research
09/08/2020

Silicon Dating

In order to service an ever-growing base of legacy electronics, both gov...

Please sign up or login with your details

Forgot password? Click here to reset