Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.6.1449

A lightweight detection mechanism of control flow modification for IoT devices  

Pak, Dohyun (Gachon University)
Lee, JongHyup (Gachon University)
Abstract
Constrained IoT devices cannot achieve full coverage of software attestation even though the integrity of software is critical. The limited modification attacks on control flow of software aim at the shadow area uncovered in software attestation processes. In this paper, we propose a light-weight protection system that detects modification by injecting markers to program code.
Keywords
Software Attestation; IoT devices;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, "SWATT: Software-based attestation for embedded devices," Proceedings of IEEE Symposium on Security and Privacy. pp. 272-282, May. 2004.
2 A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla, "SCUBA: Secure Code Update By Attestation in sensor networks," Proceedings of ACM workshop on Wireless security, pp. 85-94, Sep. 2006.
3 JongHyup Lee, LeeHyung Kim, and Taekyoung Kwon, "Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks," IEEE Transactions on Industrial Informatics, (early access), Aug. 2015.
4 Paul Craig, Mark Ron. Software Piracy Exposed - Secrets from the Dark Side Revealed, Andrew Williams, 2015.
5 Gunnar Blom, Lars Holst, Dennis Sandell, Problems and Snapshots from the World of Probability, Springer-Verlag, 1994.
6 M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, "Control-flow integrity principles, implementations, and applications," ACM Transactions on Information and System Security, vol. 13, no. 1, pp. 4:1-40, Oct. 2009.
7 G. Necula, S. McPeak, and S. Rahul, "CIL: Intermediate language and tools for analysis and transformation of C programs," Compiler Construction, pp 213-228,, Springer, Jan. 2002.
8 NIST Software Assusrance Reference Dataset, http://samate.nist.gov/SARD/