Open Platform Systems Under Scrutiny: A Cybersecurity Analysis of the Device Tree

Embedded systems are deployed in systems ranging from personal devices to systems deployed in critical infrastructure. Due to the advent of Industry 4.0 and the rising need for platform transparency and uniformity, developers opt for open-source modular system software that replace the conventional monolithic firmware approach. A common part of the modern embedded system is the Device Tree, a hardware description structure leveraged by the OS kernel. This modular approach and its malleability, however, can be exposed as a vulnerability and enable an array of attacks that would disrupt and destabilize the system. In this paper, we consider the Device Tree from a cybersecurity perspective. We identify scenarios that would enable covert attacks on a target system as well as propose countermeasures from the state-of-the-art.

[1]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[2]  Michail Maniatakos,et al.  The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.

[3]  William A. Arbaugh,et al.  A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[4]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[5]  Michail Maniatakos,et al.  Remote field device fingerprinting using device-specific modbus information , 2016, 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS).

[6]  Thomas Morris,et al.  Trusted Platform Module , 2011, Encyclopedia of Cryptography and Security.

[7]  Stefan Mangard,et al.  Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript , 2015, DIMVA.