Software-Based Remote Attestation for Safety-Critical Systems

Assuring system integrity to a remote communication partner through attestation is a security concept which also is very important for safety-critical systems facing security threats. Most remote attestation methods are based on integrity measurement mechanisms embedded in the underlying hardware or software (e.g. operating system). Alternatively, the application software can measure itself, whereas the security of this approach relies on obscurity of the measurement mechanism. There are several tools available to introduce such obscurity through automatic code transformations, but these tools cannot be applied to safety-critical systems, because automatic code transformations are difficult to justify during safety certification. We present a software-based remote attestation concept for safety-critical systems and apply it to an automation system case study. The attestation concept utilizes the safety-related black channel principle to allow the application of code protection tools in order to protect the attestation mechanism without increasing the safety certification effort for the system.

[1]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[2]  Adrian Perrig,et al.  SBAP: Software-Based Attestation for Peripherals , 2010, TRUST.

[3]  Markus Jakobsson,et al.  Practical and Secure Software-Based Attestation , 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications.

[4]  Mariano Ceccato,et al.  Remote Entrusting by Run-Time Software Authentication , 2008, SOFSEM.

[5]  Mikael Gidlund,et al.  Efficient integration of secure and safety critical industrial wireless sensor networks , 2011, EURASIP J. Wirel. Commun. Netw..

[6]  Yuan Xiang Gu,et al.  An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs , 2001, ISC.

[7]  Partha Dasgupta,et al.  A Multi-factor Approach to Securing Software on Client Computing Platforms , 2010, 2010 IEEE Second International Conference on Social Computing.

[8]  Thomas Wilhelm,et al.  Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research , 2007 .

[9]  Claudio Soriente,et al.  On the difficulty of software-based attestation of embedded devices , 2009, CCS.

[10]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[11]  Ahmad-Reza Sadeghi,et al.  Short paper: lightweight remote attestation using physical functions , 2011, WiSec '11.

[12]  Jonathan K. Millen,et al.  Principles of remote attestation , 2011, International Journal of Information Security.

[13]  Yongdae Kim,et al.  Remote Software-Based Attestation for Wireless Sensors , 2005, ESAS.

[14]  Partha Dasgupta,et al.  Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation , 2010, ICISS.

[15]  Christopher Preschern,et al.  An Architecture for Safe and Secure Automation System Devices and Maintenance Process , 2012, 2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems.

[16]  Partha Dasgupta,et al.  Software Based Remote Attestation for OS Kernel and User Applications , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[17]  Raghunathan Srinivasan Determining the Integrity of Applications and Operating Systems using Remote and Local Attesters , 2011 .

[18]  Hermann Kopetz Real-Time Operating Systems , 2011 .