메뉴 건너뛰기




Volumn , Issue , 2009, Pages 400-409

On the difficulty of software-based attestation of embedded devices

Author keywords

Code compression; Embedded systems; Indisputable code execution; Return oriented programming; Software based attestation; SWATT; Wireless sensor networks

Indexed keywords

ACCESS DEVICES; CODE COMPRESSION; CODE EXECUTION; DEDICATED HARDWARE; EMBEDDED DEVICE; FREE SPACE; MALICIOUS CODES; PROGRAMMING SOFTWARE; RETURN-ORIENTED PROGRAMMING; SECURITY PROTOCOLS; SOFTWARE-BASED; TIME CONSTRAINTS;

EID: 74049112175     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653711     Document Type: Conference Paper
Times cited : (173)

References (33)
  • 2
    • 74049159298 scopus 로고    scopus 로고
    • ANDERSON, R., AND KUHN, M. Tamper resistance - a cautionary note. In In Proceedings of the Second Usenix Workshop on Electronic Commerce (1996).
    • ANDERSON, R., AND KUHN, M. Tamper resistance - a cautionary note. In In Proceedings of the Second Usenix Workshop on Electronic Commerce (1996).
  • 3
    • 84876544741 scopus 로고    scopus 로고
    • ATMEL CORPORATION
    • ATMEL CORPORATION. Atmega128 datasheet. http://www.atmel.com/atmel/acrobat/doc2467.pdf.
    • Atmega128 datasheet
  • 4
    • 70349267779 scopus 로고    scopus 로고
    • When good instructions go bad: Generalizing return-oriented programming to RISC
    • ACM
    • BUCHANAN, E., ROEMER, R., SHACHAM, H., AND SAVAGE, S. When good instructions go bad: generalizing return-oriented programming to RISC. In Proceedings of CCS '08 (2008), ACM.
    • (2008) Proceedings of CCS '08
    • BUCHANAN, E.1    ROEMER, R.2    SHACHAM, H.3    SAVAGE, S.4
  • 5
    • 38049155586 scopus 로고    scopus 로고
    • CHOI, Y.-G., KANG, J., AND NYANG, D. Proactive code verification protocol in wireless sensor network. In ICCSA (2007), O. Gervasi and M. L. Gavrilova, Eds., 4706 of Lecture Notes in Computer Science, Springer.
    • CHOI, Y.-G., KANG, J., AND NYANG, D. Proactive code verification protocol in wireless sensor network. In ICCSA (2007), O. Gervasi and M. L. Gavrilova, Eds., vol. 4706 of Lecture Notes in Computer Science, Springer.
  • 8
    • 74049100701 scopus 로고    scopus 로고
    • Self-healing control flow protection in sensor applications
    • ACM
    • FERGUSON, C., GU, Q., AND SHI, H. Self-healing control flow protection in sensor applications. In WiSec '09 (2009), ACM.
    • (2009) WiSec '09
    • FERGUSON, C.1    GU, Q.2    SHI, H.3
  • 11
    • 56749092203 scopus 로고    scopus 로고
    • Towards self-propagate mal-packets in sensor networks
    • ACM
    • GU, Q., AND NOORANI, R. Towards self-propagate mal-packets in sensor networks. In WiSec (2008), ACM.
    • (2008) WiSec
    • GU, Q.1    NOORANI, R.2
  • 13
    • 61649123623 scopus 로고    scopus 로고
    • HU, W., CORKE, P., SHIH, W. C., AND OVERS, L. secfleck: A public key technology platform for wireless sensor networks. In EWSN (2009), 5432 of Lecture Notes in Computer Science, Springer.
    • HU, W., CORKE, P., SHIH, W. C., AND OVERS, L. secfleck: A public key technology platform for wireless sensor networks. In EWSN (2009), vol. 5432 of Lecture Notes in Computer Science, Springer.
  • 14
    • 84938015047 scopus 로고
    • A method for the constructionof minimum redundancy codes
    • HUFFMAN, D.A. A method for the constructionof minimum redundancy codes. Proceedings of the IRE 40 (1962).
    • (1962) Proceedings of the IRE , vol.40
    • HUFFMAN, D.A.1
  • 18
    • 74049155208 scopus 로고    scopus 로고
    • KRAHMER, S. x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique. Tech. rep., suse, September 2005. available at http://www.suse.de/ krahmer/no-nx.pdf.
    • KRAHMER, S. x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique. Tech. rep., suse, September 2005. available at http://www.suse.de/ krahmer/no-nx.pdf.
  • 20
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits (pax case study)
    • NERGAL. The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine 58, 4 (2001). http://www.phrack.org/issues.html? issue=58&id=4.
    • (2001) Phrack Magazine , vol.58 , pp. 4
    • NERGAL1
  • 21
    • 19944369062 scopus 로고    scopus 로고
    • Soft tamper-proofing via program integrity verification in wireless sensor networks
    • PARK, T., AND SHIN, K. G. Soft tamper-proofing via program integrity verification in wireless sensor networks. IEEE Trans. Mob. Comput. 4, 3 (2005).
    • (2005) IEEE Trans. Mob. Comput , vol.4 , pp. 3
    • PARK, T.1    SHIN, K.G.2
  • 22
    • 74049121490 scopus 로고    scopus 로고
    • SESHADRI, A., LUK, M., AND PERRIG, A. SAKE: Software attestation for key establishment in sensor networks. In DCOSS '08: Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems (2008).
    • SESHADRI, A., LUK, M., AND PERRIG, A. SAKE: Software attestation for key establishment in sensor networks. In DCOSS '08: Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems (2008).
  • 23
    • 34247361254 scopus 로고    scopus 로고
    • SESHADRI, A., LUK, M., PERRIG, A., VAN DOORN, L., AND KHOSLA, P. SCUBA: Secure code update by attestation in sensor networks. In WiSe '06: Proceedings of the 5th ACM workshop on Wireless security (2006), ACM.
    • SESHADRI, A., LUK, M., PERRIG, A., VAN DOORN, L., AND KHOSLA, P. SCUBA: Secure code update by attestation in sensor networks. In WiSe '06: Proceedings of the 5th ACM workshop on Wireless security (2006), ACM.
  • 27
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • ACM
    • SHACHAM, H. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proceedings of CCS 2007 (2007), ACM.
    • (2007) Proceedings of CCS 2007
    • SHACHAM, H.1
  • 28
    • 47249093937 scopus 로고    scopus 로고
    • Remote software-based attestation for wireless sensors
    • SHANECK, M., MAHADEVAN, K., KHER, V., AND KIM, Y. Remote software-based attestation for wireless sensors. In ESAS (2005).
    • (2005) ESAS
    • SHANECK, M.1    MAHADEVAN, K.2    KHER, V.3    KIM, Y.4
  • 30
  • 31
    • 74049088849 scopus 로고    scopus 로고
    • TEXAS INSTRUMENTS. Msp430 f1611 datasheet.
    • TEXAS INSTRUMENTS. Msp430 f1611 datasheet.
  • 32
    • 70450277529 scopus 로고    scopus 로고
    • YANG, X., COOPRIDER, N., AND REGEHR, J. Eliminating the call stack to save ram. In To appear in LCTES 2009 (June 2009), ACM.
    • YANG, X., COOPRIDER, N., AND REGEHR, J. Eliminating the call stack to save ram. In To appear in LCTES 2009 (June 2009), ACM.
  • 33
    • 47249110641 scopus 로고    scopus 로고
    • Distributed software-based attestation for node compromise detection in sensor networks. In SRDS
    • YANG, Y., WANG, X., ZHU, S., AND CAO, G. Distributed software-based attestation for node compromise detection in sensor networks. In SRDS (2007), IEEE Computer Society.
    • IEEE Computer Society
    • YANG, Y.1    WANG, X.2    ZHU, S.3    CAO, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.