{"title":"通过体系结构资源的系统分解提高嵌入式系统的安全保障","authors":"Michael D. Wilder, R. Rinker","doi":"10.1109/HICSS.2012.318","DOIUrl":null,"url":null,"abstract":"Resource constraints imposed upon embedded systems make it particularly challenging to provide high levels of security assurance without degrading their performance. We present a method for increasing security assurance of embedded systems without reducing system performance. This method employs a systemic dissolution of architected resources that reduces the attack surface of embedded systems. We show that attacks which insert foreign instructions or modify existing instructions are impossible against systems hardened using this method. We further show that systems hardened using this method are difficult if not impossible to compromise using attacks that re-use existing program logic by diverting control flow, such as return-into-libc. We discuss advantages and shortcomings of this method, and describe a prototype that applies the method to programs targeted for the Intel 8051.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improving Security Assurance of Embedded Systems through Systemic Dissolution of Architected Resources\",\"authors\":\"Michael D. Wilder, R. Rinker\",\"doi\":\"10.1109/HICSS.2012.318\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Resource constraints imposed upon embedded systems make it particularly challenging to provide high levels of security assurance without degrading their performance. We present a method for increasing security assurance of embedded systems without reducing system performance. This method employs a systemic dissolution of architected resources that reduces the attack surface of embedded systems. We show that attacks which insert foreign instructions or modify existing instructions are impossible against systems hardened using this method. We further show that systems hardened using this method are difficult if not impossible to compromise using attacks that re-use existing program logic by diverting control flow, such as return-into-libc. We discuss advantages and shortcomings of this method, and describe a prototype that applies the method to programs targeted for the Intel 8051.\",\"PeriodicalId\":380801,\"journal\":{\"name\":\"2012 45th Hawaii International Conference on System Sciences\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-02-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 45th Hawaii International Conference on System Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HICSS.2012.318\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 45th Hawaii International Conference on System Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HICSS.2012.318","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improving Security Assurance of Embedded Systems through Systemic Dissolution of Architected Resources
Resource constraints imposed upon embedded systems make it particularly challenging to provide high levels of security assurance without degrading their performance. We present a method for increasing security assurance of embedded systems without reducing system performance. This method employs a systemic dissolution of architected resources that reduces the attack surface of embedded systems. We show that attacks which insert foreign instructions or modify existing instructions are impossible against systems hardened using this method. We further show that systems hardened using this method are difficult if not impossible to compromise using attacks that re-use existing program logic by diverting control flow, such as return-into-libc. We discuss advantages and shortcomings of this method, and describe a prototype that applies the method to programs targeted for the Intel 8051.