Harnessing the Power of Mobile and Embedded Devices for Secure and Reliable
Systems is coming at 11/26/2018 - 4:00pm

LINC 200
Mon, 11/26/2018 - 4:00pm

Saurabh Bagchi
Professor,  School of Electrical and Computer Engineering and the Department
of Computer Science ,  Purdue University

Abstract:
The proliferation of the Internet of Things (IoT) is bringing new levels of
connectivity and automation to embedded systems. This connectivity has great
potential to improve our lives but it also exposes embedded systems to
network-based attacks on an unprecedented scale. Attacks against IoT devices
have already unleashed massive Denial of Service attacks, invalidated traffic
tickets, taken control of vehicles, and facilitated robbing hotel rooms.
Embedded devices face a wide variety of attacks similar to always-connected
server-class systems. Hence, their security must become a first-class
concern. We focus on a particularly vulnerable and constrained subclass of
embedded systems: bare-metal systems. They execute a single statically linked
binary image providing both the (operating) system functionality and
application logic without privilege separation between the two. Bare-metal
systems are not an exotic platform: they are often found as part of larger
systems, e.g., smart phones delegate control over the lower protocol layers
of WiFi and Bluetooth to a dedicated bare-metal System on a Chip (SoC). These
components can be compromised to gain access to higher level systems, the
smartphones application processor in this case.

To improve the security state of bare-metal systems toward those in
server-class systems, we develop a novel technique, called privilege
overlaying, wherein operations requiring privileged execution are identified
and only these operations execute in privileged mode¾this is the /principle
of least privileges/ being brought to the embedded world. This provides the
foundation on which code integrity, adapted control-flow hijacking defenses,
and protections for sensitive IO are applied. We also design fine-grained
randomization schemes, that work within the constraints of bare-metal systems
to provide further protection against control-flow and data corruption
attacks.

However, these security protections reduce the ability of embedded devices or
mobile devices to run computationally demanding streaming applications, such
as, streaming video analytics. Therefore, we demonstrate the power of
approximate computing that can reduce the fidelity of the results with a
bounded degradation in output quality but reducing the execution time and
energy drain. Thus, in some application domains of mobile and embedded
systems, we can have our cake and eat it too.

Bio:

Read more:
https://eecs.oregonstate.edu/colloquium/harnessing-power-mobile-and-embe... 
[1]


[1] 
https://eecs.oregonstate.edu/colloquium/harnessing-power-mobile-and-embedded-devices-secure-and-reliable-systems
_______________________________________________
Colloquium mailing list
[email protected]
https://secure.engr.oregonstate.edu/mailman/listinfo/colloquium
  • [EECS Colloquium] ... School of Electrical Engineering & Computer Science

Reply via email to