Abstract
Remote attestation is a very important mechanism helping a trusted party to get the status of a remote embedded device. Most remote attestation schemes aim at checking the code integrity and leave devices vulnerable to runtime attacks. Recently a new kind of attestation called control flow attestation has been proposed to get rid of this limitation. However, previous studies on control flow attestation cannot verify the attestation result efficiently and lack secure storage.
In this paper, we present a log-based attestation scheme that not only can attest the control flow path of programs on embedded devices but also can verify the attestation result very efficiently. We use a lightweight root of trust in our attestation. We implement our system on Hikey board using ARM TrustZone security extension. We evaluate the performance using a popular embedded device benchmark Mibench and demonstrate that our scheme has a high security assurance and a good performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Eldefrawy, K., Tsudik, G., Francillon, A., Perito, D.: SMART: secure and minimal architecture for (establishing dynamic) root of trust. In: NDSS, vol. 12, pp. 1–15 (2012)
Koeberl, P., Schulz, S., Sadeghi, A.-R., Varadharajan, V.: TrustLite: a security architecture for tiny embedded devices. In: Proceedings of the Ninth European Conference on Computer Systems, EuroSys 2014, pp. 10:1–10:14. ACM, New York (2014)
Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: generalizing return-oriented programming to RISC. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 27–38. ACM (2008)
Bletsch, T., Jiang, X., Freeh, V.W., Liang, Z.: Jump-oriented programming: a new class of code-reuse attack. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 30–40. ACM, New York (2011)
Abadi, M., Budiu, M., Erlingsson, Ú., Ligatti, J.: Control-flow integrity. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, pp. 340–353. ACM, New York (2005)
Kuznetsov, V., Szekeres, L., Payer, M., Candea, G., Sekar, R., Song, D.: Code-pointer integrity. In: Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, OSDI 2014, pp. 147–163. USENIX Association, Berkeley (2014)
Abera, T., et al.: C-FLAT: control-flow attestation for embedded systems software. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 743–754. ACM, New York (2016)
Dessouky, G., et al.: Lo-fat: low-overhead control flow attestation in hardware. In: Proceedings of the 54th Annual Design Automation Conference 2017, DAC 2017, pp. 24:1–24:6. ACM, New York (2017)
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026–2030 (2002)
ARM Information Center, 11 July 2017. http://infocenter.arm.com/help/index.jsp
OP-TEE Trusted OS. https://github.com/OP-TEE/optee_os
Qualcomm Security Platform. https://www.qualcomm.com/solutions/mobile-computing/features/security
Linnartz, J.-P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-44887-X_47
Zhao, S., Zhang, Q., Hu, G., Qin, Y., Feng, D.: Providing root of trust for ARM TrustZone using on-chip SRAM. In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED 2014, pp. 25–36. ACM, New York (2014)
Machiry, A., et al.: Boomerang: exploiting the semantic gap in trusted execution environments (2017)
Data Execution Prevention. https://msdn.microsoft.com/zh-cn/library/aa366553(vs.85).aspx
Acknowledgements
The research presented in this paper is supported by the National Key Research and Development Program of China under Grant No. 2018YFB0904900, 2018YFB0904903 and the National Natural Science Foundation of China under Grant No. 61872343, 61802375, 61602455.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, J., Yu, Q., Liu, W., Zhao, S., Feng, D., Luo, W. (2019). Log-Based Control Flow Attestation for Embedded Devices. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-37337-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37336-8
Online ISBN: 978-3-030-37337-5
eBook Packages: Computer ScienceComputer Science (R0)