A Novel Integrity Measurement Architecture for Embedded Linux Systems

被引:0
|
作者
Jia Q. [1 ,2 ]
Ma H. [3 ]
Li Y. [3 ]
Wang Z. [3 ]
Shi W. [4 ]
机构
[1] Institute of Software, Chinese Academy of Sciences, Beijing
[2] University of Chinese Academy of Sciences, Beijing
[3] School of Cyber Engineering, Xidian University, Xi'an
[4] School of Information, Renmin University of China, Beijing
基金
中国国家自然科学基金;
关键词
Embedded system; Integrity measurement architecture; Linux; Trusted computing; Trusted platform module;
D O I
10.7544/issn1000-1239.20220525
中图分类号
学科分类号
摘要
Integrity measurement architecture (IMA) is an important component of trusted computing. However, existing IMA schemes possess a number of practical limitations when applied in embedded systems. In this paper, we propose dynamic integrity measurement architecture at kernel-level (DIMAK), an effective and efficient runtime integrity measurement architecture for embedded Linux systems. DIMAK supports just-in-time integrity measurement for code texts and static data in both kernel and user space, as well as dynamic linking information maintained by position independent executables (PIE). Exploiting the process, memory and page management mechanism of Linux kernel, DIMAK is capable of measuring the to-be-measured contents at physical-page-level, hence avoids potential time-of-check to time-of-use (TOCTTOU) vulnerability that has been discovered in existing techniques. On top of that, by proposing a predictive integrity baseline generation technique for the relocation and dynamic linking information of ELF files, the proposed architecture achieves better completeness than the state-of-the-art schemes in case of responding to threats like hooking-based control flow hijacking and dynamically loaded malware. Also, with a novel trusted software hot-fix protocol, the proposed architecture becomes the first IMA scheme capable of correctly distinguishing on-the-fly software patching behaviors from malicious code loading. Given different types of contents to be measured, DIMAK generates the corresponding integrity baselines at a variety of timings, e.g., during off-line phase, system booting, process loading or dynamic code loading, thus ensures correctness of the architecture's integrity measurement for all possible scenarios. Experiments on real commercial embedded devices have also shown that performance overhead caused by DIMAK is sufficiently acceptable for embedded devices. © 2022, Science Press. All right reserved.
引用
收藏
页码:2362 / 2375
页数:13
相关论文
共 21 条
  • [1] Sailer R, Zhang Xiaolan, Jaeger T, Et al., Design and implementation of a TCG-based integrity measurement architecture, Proc of the 13th USENIX Security Symp, pp. 223-238, (2004)
  • [2] Jaeger T, Sailer R, Shankar U., PRIMA: Policy-reduced integrity measurement architecture, Proc of the 11th ACM Symp on Access Control Models and Technologies, pp. 19-28, (2006)
  • [3] Apvrille A, Gordon D, Hallyn S E, Et al., DigSig: Runtime authentication of binaries at kernel level, Proc of the 18th USENIX Large Installation System Administration Conf, 4, pp. 59-66, (2004)
  • [4] Weng Xiaokang, Research and implementation on integrity protection techniques for terminal computer, (2014)
  • [5] Li Yu, Zhao Yong, Lin Li, Et al., Method of trusted measurement for operating system kernel, Journal of Chinese Computer Systems, 34, 5, pp. 997-1002, (2013)
  • [6] Loscocco P A, Wilson P W, Pendergrass J A, Et al., Linux kernel integrity measurement using contextual inspection, Proc of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 21-29, (2007)
  • [7] Petroni N L, Fraser T, Molina J, Et al., Copilot-A coprocessor-based kernel runtime integrity monitor, Proc of the 13th USENIX Security Symp, pp. 179-194, (2004)
  • [8] Liu Ziwen, Feng Dengguo, TPM-based dynamic integrity measurement architecture, Journal of Electronics and Information Technology, 32, 4, pp. 875-879, (2010)
  • [9] Shi E, Perrig A, Van Doorn L., Bind: A fine-grained attestation service for secure distributed systems, Proc of the 2005 IEEE Symp on Security and Privacy, pp. 154-168, (2005)
  • [10] Li Xiao, Shi Wenchang, Liang Zhaohui, Et al., Operating system mechanisms for TPM-based lifetime measurement of process integrity, Proc of the 2009 IEEE 6th Int Conf on Mobile Adhoc and Sensor Systems, pp. 783-789, (2009)