Muhammad Hataba, Ahmed B. T. Sherif, Reem Elkhouly
{"title":"A Proposed Software Protection Mechanism for Autonomous Vehicular Cloud Computing","authors":"Muhammad Hataba, Ahmed B. T. Sherif, Reem Elkhouly","doi":"10.1109/MWSCAS47672.2021.9531682","DOIUrl":null,"url":null,"abstract":"Cars are becoming smarter every day. They are being equipped with sensors, communications interfaces, and more powerful processing capabilities. The primary purpose was to enable these cars to drive themselves without any human interventions and become so-called Autonomous Vehicles (AVs). But why stop there, why not harness all that computing power for a greater collective purpose. That’s how the idea of Autonomous Vehicular Cloud Computing (AVCC) was born. Nonetheless, this is not a trivial task, the mobile and dynamic nature of vehicles poses a significant challenge in the formation and management of this cloud computing model and yet a more substantial challenge in terms of security and privacy of all the parties involved in this system. In this paper, we focus on protecting software running on AVCC. We use dynamic obfuscated compilation to complicate programs’ execution paths and hinder information leakage via side channels attacks. Relying on compilers offers advantages, such as the independence of architecture and support for a variety high-level programming languages and application simplicity with minimal set-up cost. Here, we introduce our system in the realm of ARM processor, which power AVCC. Then, we present execution statistics for simple standard programs. The results show tangible timing variations in diversified code versions for the same program, which may disrupt side-channel attacks.","PeriodicalId":6792,"journal":{"name":"2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS)","volume":"60 1","pages":"878-881"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MWSCAS47672.2021.9531682","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Cars are becoming smarter every day. They are being equipped with sensors, communications interfaces, and more powerful processing capabilities. The primary purpose was to enable these cars to drive themselves without any human interventions and become so-called Autonomous Vehicles (AVs). But why stop there, why not harness all that computing power for a greater collective purpose. That’s how the idea of Autonomous Vehicular Cloud Computing (AVCC) was born. Nonetheless, this is not a trivial task, the mobile and dynamic nature of vehicles poses a significant challenge in the formation and management of this cloud computing model and yet a more substantial challenge in terms of security and privacy of all the parties involved in this system. In this paper, we focus on protecting software running on AVCC. We use dynamic obfuscated compilation to complicate programs’ execution paths and hinder information leakage via side channels attacks. Relying on compilers offers advantages, such as the independence of architecture and support for a variety high-level programming languages and application simplicity with minimal set-up cost. Here, we introduce our system in the realm of ARM processor, which power AVCC. Then, we present execution statistics for simple standard programs. The results show tangible timing variations in diversified code versions for the same program, which may disrupt side-channel attacks.