Abstract
Remote attestation is a crucial security service particularly relevant to increasingly popular IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a remote, and potentially malware-infected, device (prover). Most existing approaches are static in nature and only check whether benign software is initially loaded on the prover. However, they are vulnerable to runtime attacks that hijack the application's control or data flow, e.g., via return-oriented programming or data-oriented exploits. As a concrete step towards more comprehensive runtime remote attestation, we present the design and implementation of Control-FLow ATtestation (C-FLAT) that enables remote attestation of an application's control-flow path, without requiring the source code. We describe a full prototype implementation of C-FLAT on Raspberry Pi using its ARM TrustZone hardware security extensions. We evaluate C-FLAT's performance using a real-world embedded (cyber-physical) application, and demonstrate its efficacy against control-flow hijacking attacks.
Original language | English |
---|---|
Title of host publication | CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security |
Publisher | ACM |
Pages | 743-754 |
Number of pages | 12 |
ISBN (Electronic) | 978-1-4503-4139-4 |
DOIs | |
Publication status | Published - 24 Oct 2016 |
MoE publication type | A4 Article in a conference publication |
Event | ACM Conference on Computer and Communications Security - Hofburg Palace, Vienna, Austria Duration: 24 Oct 2016 → 28 Oct 2016 Conference number: 23 https://www.sigsac.org/ccs/CCS2016/ |
Conference
Conference | ACM Conference on Computer and Communications Security |
---|---|
Abbreviated title | CCS |
Country/Territory | Austria |
City | Vienna |
Period | 24/10/2016 → 28/10/2016 |
Internet address |