EAI Endorsed Transactions on Security and Safety | |
Side-channel Programming for Software Integrity Checking | |
Eugene Vasserman1  Hong Liu2  | |
[1] Department of Computer Science, Kansas State University, Manhattan, KS 66506 USA;Work performed while at Kansas State University; | |
关键词: security; embedded systems; software integrity; side-channel analysis; | |
DOI : 10.4108/eai.2-6-2021.170013 | |
来源: DOAJ |
【 摘 要 】
Verifyingsoftwareintegrityforembeddedsystems,especiallylegacyanddeployedsystems,isvery challenging.Ordinaryintegrityprotectionandverificationmethodsrelyonsophisticatedprocessorsor security hardware, and cannot be applied to many embedded systems due to cost, energy consumption, and inability of update. Furthermore, embedded systems are often small computers on a single chip, making it more difficult to verify integrity without invasive access to the hardware. In this work, we propose “side-channel programming”, a novel method to assist with non-intrusive software integrity checking by transforming code in a functionality-preserving manner while making it possible to verify the internal state of a running device via side-channels. To do so, we first need to accurately profile the side-channel emanations of an embedded device. Using new black-box side-channel profiling techniques, weshowthatitispossibletobuildaccurateside-channelmodelsofaPICmicrocontrollerwithnoprior knowledge of the detailed microcontroller architecture. It even allows us to uncover undocumented behavior of the microcontroller. Then we show how to “side-channel program” the target device in a way that we can verify its internal state from simply measuring the passive side-channel emanations.
【 授权许可】
Unknown