Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems
By Paul D. Martin, David Russell, Aviel D. Rubin, Stephen Checkoway, and Malek Ben Salem.
In Proceedings of IoTDI. IEEE Computer Society/ACM, April 2018.
Abstract
Embedded devices are designed to cover many possible use cases. In practice only a small subset of features may be used in a given deployment. As devices age, some features turn out to be security risks. We address these problems by creating Sentinel, a secure mode profiler for embedded devices. Sentinel uses a bus tapping interface to derive a partial control flow graph during device execution. This graph represents the subset of device modes actually observed during use. The control flow graph is generated without any prior knowledge of the device or its software and constitutes a security profile which can be used to audit device execution in order to detect attacks. The profile can be easily enforced by existing bus monitors with minor modifications.
Material
- Proceeding version (local copy) in PDF
Reference
@InProceedings{martin-et-al:sentinel:iotdi18,
author = {Paul D. Martin and David Russel and Malek Ben Salem
and Stephen Checkoway and Avi Rubin},
title = {Sentinel: Secure Mode Profiling and Enforcement for
Embedded Systems},
booktitle = {Proceedings of the ACM/IEEE International Conference
on Internet of Things Design and Implementation, 2018},
editor = {Olaf Landsiedel and Klara Nahrstedt},
publisher = {ACM/IEEE},
year = 2018,
month = apr,
url = {https://checkoway.net/papers/sentinel2018},
}