论文标题

设计深入嵌入式系统的剥削缓解措施的挑战

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

论文作者

Abbasi, Ali, Wetzels, Jos, Holz, Thorsten, Etalle, Sandro

论文摘要

内存腐败漏洞已经存在数十年,并且在嵌入式系统中最普遍的漏洞中排名一列。然而,这种受到限制的环境构成了独特的设计和实施挑战,这显着使采用通用硬化技术的采用变得复杂。结合嵌入式补丁管理的不规则和涉及的性质,这导致了长时间的脆弱性暴露窗口和脆弱性相对容易利用。考虑到许多嵌入式系统的敏感和批判性质,这种情况值得一看。在这项工作中,我们介绍了在42个嵌入式操作系统中采用缓解措施的第一个定量研究,这表明嵌入式世界显着落后于通用世界。为了提高深层嵌入式系统的安全性,我们随后提出了μarmor,这是一种解决定量分析中确定的一些关键差距的方法。 μarmor提高了限制嵌入式记忆损坏漏洞的栏杆,同时在短期内可采用而不会产生额外的额外性能或存储成本。

Memory corruption vulnerabilities have been around for decades and rank among the most prevalent vulnerabilities in embedded systems. Yet this constrained environment poses unique design and implementation challenges that significantly complicate the adoption of common hardening techniques. Combined with the irregular and involved nature of embedded patch management, this results in prolonged vulnerability exposure windows and vulnerabilities that are relatively easy to exploit. Considering the sensitive and critical nature of many embedded systems, this situation merits significant improvement. In this work, we present the first quantitative study of exploit mitigation adoption in 42 embedded operating systems, showing the embedded world to significantly lag behind the general-purpose world. To improve the security of deeply embedded systems, we subsequently present μArmor, an approach to address some of the key gaps identified in our quantitative analysis. μArmor raises the bar for exploitation of embedded memory corruption vulnerabilities, while being adoptable on the short term without incurring prohibitive extra performance or storage costs.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源