Practical Principle of Least Privilege for Secure Embedded Systems

被引:16
|
作者
Jero, Samuel [1 ]
Furgala, Juliana [1 ]
Pan, Runyu [2 ]
Gadepalli, Phani Kishore [2 ]
Clifford, Alexandra [1 ,3 ]
Ye, Bite [2 ]
Khazan, Roger [1 ]
Ward, Bryan C. [1 ]
Parmer, Gabriel [2 ]
Skowyra, Richard [1 ]
机构
[1] MIT, Lincoln Lab, Cambridge, MA 02139 USA
[2] George Washington Univ, Washington, DC 20052 USA
[3] Draper Lab, Cambridge, MA USA
关键词
D O I
10.1109/RTAS52030.2021.00009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many embedded systems have evolved from simple bare-metal control systems to highly complex network-connected systems. These systems increasingly demand rich and feature-full operating-systems (OS) functionalities. Furthermore, the network connectedness offers attack vectors that require stronger security designs. To that end, this paper defines a prototypical RTOS API called Patina that provides services common in feature-rich OSes (e.g., Linux) but absent in more trustworthy mu-kernel-based systems. Examples of such services include communication channels, timers, event management, and synchronization. Two Patina implementations are presented, one on Composite and the other on seL4, each of which is designed based on the Principle of Least Privilege (PoLP) to increase system security. This paper describes how each of these mu-kernels affect the PoLP-based design, as well as discusses security and performance tradeoffs in the two implementations. Results of comprehensive evaluations demonstrate that the performance of the PoLP-based implementation of Patina offers comparable or superior performance to Linux, while offering heightened isolation.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 50 条
  • [21] Protecting Bare-metal Embedded Systems With Privilege Overlays
    Clements, Abraham A.
    Almakhdhub, Naif Saleh
    Saab, Khaled S.
    Srivastava, Prashast
    Koo, Jinkyu
    Bagchi, Saurabh
    Payer, Mathias
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 289 - 303
  • [22] Applying the Principle of Least Privilege to System Management Interrupt Handlers with the Intel SMI Transfer Monitor
    Delgado, Brian
    Vibhute, Tejaswini
    Karavanic, Karen L.
    PROCEEDINGS OF THE 9TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2020, 2020,
  • [23] Fermat's least-time principle and the embedded transparent lens
    Kantowski, R.
    Chen, B.
    Dai, X.
    PHYSICAL REVIEW D, 2013, 88 (08):
  • [24] Designing Secure and Resilient Embedded Avionics Systems
    Li, Jason H.
    Schafer, Douglas
    Whelihan, David
    Lassini, Stefano
    Evancich, Nicholas
    Kwak, Kyung Joon
    Vai, Michael
    Whitman, Haley
    2018 IEEE CYBERSECURITY DEVELOPMENT CONFERENCE (SECDEV 2018), 2018, : 139 - 139
  • [25] An Approach for the Design of Secure Communication in Embedded Systems
    Ocenasek, Pavel
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: DESIGNING INFORMATION ENVIRONMENTS, PT I, 2009, 5617 : 579 - 586
  • [26] Three Design Dimensions of Secure Embedded Systems
    Schaumont, Patrick
    Aysu, Aydin
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2013, 2013, 8204 : 1 - 20
  • [27] Secure Embedded Hypervisor based Systems for Automotive
    Thiebaut, Stefaan Sonck
    De Rosa, Antonio
    Sasse, Ralph
    2016 46TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2016, : 211 - 212
  • [28] Secure and Stateful Power Transitions in Embedded Systems
    Archanaa S. Krishnan
    Charles Suslowicz
    Patrick Schaumont
    Journal of Hardware and Systems Security, 2020, 4 (4) : 263 - 276
  • [29] Secure software delivery and installation in embedded systems
    Adelsbach, A
    Huber, U
    Sadeghi, AR
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 255 - 267
  • [30] Tamper resistance mechanisms for secure embedded systems
    Ravi, S
    Raghunathan, A
    Chakradhar, S
    17TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS: DESIGN METHODOLOGIES FOR THE GIGASCALE ERA, 2004, : 605 - 611