Author | Xavier Carpent; Karim Eldefrawy; Norrathep Rattanavipanon; Ahmad-Reza Sadeghi; Gene Tsudik |
---|---|
Date | July 2018 |
Kind | Inproceedings |
Publisher | ACM |
Adress | San Francisco, USA |
Research Areas | CROSSING, Solutions: S2, ICRI-SC, System Security Lab, CYSEC |
Abstract | Remote attestation (RA) is a means of malware detection, typically realized as an interaction between a trusted verifier and a potentially compromised remote device (prover). RA is especially relevant for low-end embedded devices that are incapable of protecting themselves against malware infection. Most current RA techniques require on-demand and uninterruptible (atomic) operation. The former fails to detect transient malware that enters and leaves between successive RA instances; the latter involves performing potentially time-consuming computation over prover’s memory and/or storage, which can be harmful to the device’s safety-critical functionality and general availability. However, relaxing either on-demand or atomic RA operation is tricky and prone to vulnerabilities. This paper identifies some issues that arise in reconciling requirements of safety-critical operation with those of secure remote attestation, including detection of transient and self-relocating malware. It also investigates mitigation techniques, including periodic selfmeasurements as well as interruptible attestation modality that involves shuffled memory traversals and various memory locking mechanisms. |
Important Copyright Notice:
The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author’s copyright. These works may not be reposted without the explicit permission of the copyright holder.