skip to main content
10.1145/3297280.3297364acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

iCore: continuous and proactive extrospection on multi-core IoT devices

Published:08 April 2019Publication History

ABSTRACT

In this paper, we present iCore, a novel continuous and proactive extrospection system with high visibility on IoT devices deploying multi-core ARM platforms. Dedicated cores named Isolated Cores are configured to stay in the TrustZone secure world upon system boot to perform monitoring functionalities to extrospect static normal world kernel memory area proactively, continuously, and stealthily. Different from the existing TrustZone paradigm, in which secure world serves as the slave of the normal world, iCore makes the secure world play a master role. Therefore, iCore remains stealthy and proactive to perform monitoring functionalities. The evaluation results show that iCore is effective and imposes negligible performance degradation using the SPEC CPU2017 benchmark.

References

  1. AMD. 2005. Secure Virtual Machine Architecture Reference Manual. https://www.mimuw.edu.pl/~vincent/lecture6/sources/amd-pacifica-specification.pdf.Google ScholarGoogle Scholar
  2. ARM. 2009. ARM Security Technology Building a Secure System using TrustZone Technology. http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.prd29-genc-009492c/index.html.Google ScholarGoogle Scholar
  3. ARM. 2015. ARM Cortex-A Series Programmer's Guide for ARMv8-A. http://infocenter.arm.com/help/topic/com.arm.doc.den0024a/index.html.Google ScholarGoogle Scholar
  4. ARM. 2016. SMC CALLING CONVENTION System Software on ARM Platforms. http://infocenter.arm.com/help/topic/com.arm.doc.den0028b/ARM_DEN0028B_SMC_Calling_Convention.pdf.Google ScholarGoogle Scholar
  5. ARM. 2017. ARM Trusted Firmware. https://github.com/ARM-software/arm-trusted-firmware.Google ScholarGoogle Scholar
  6. Ahmed M Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, and Wenbo Shen. 2014. Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS). Scottsdale, AZ, 90--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Rui Chang, Liehui Jiang, Wenzhi Chen, Yang Xiang, Yuxia Cheng, and Abdul-hameed Alelaiwi. 2017. MIPE: a practical memory integrity protection method in a trusted execution environment. Cluster Computing 20, 2 (2017), 1075--1087. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P Daniel, Cesati Marco, et al. 2007. Understanding the Linux kernel.Google ScholarGoogle Scholar
  9. Lucas Davi, Matthias Hanreich, Debayan Paul, Ahmad-Reza Sadeghi, Patrick Koeberl, Dean Sullivan, Orlando Arias, and Yier Jin. 2015. HAFIX: Hardware-assisted flow integrity extension. In Proceedings of the 52nd Annual Design Automation Conference. San Francisco, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lucas Davi, Patrick Koeberl, and Ahmad-Reza Sadeghi. 2014. Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation. In Proceedings of the 51st Annual Design Automation Conference. San Francisco, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. World Economic Forum. 2018. The Global Risks Report 2018, 13th Edition. http://www3.weforum.org/docs/WEF_GRR18_Report.pdf.Google ScholarGoogle Scholar
  12. VOLATILITY FOUNDATION. 2017. Volatility Framework - Volatile memory extraction utility framework. https://github.com/volatilityfoundation/volatility.Google ScholarGoogle Scholar
  13. Xinyang Ge, Hayawardh Vijayakumar, and Trent Jaeger. 2014. SPROBES: Enforcing kernel code integrity on the trustzone architecture. In Proceedings of the 3rd IEEE Mobile Security Technologies Workshop (MoST). San Jose, CA.Google ScholarGoogle Scholar
  14. GlobalPlatform. 2016. GlobalPlatform made simple guide: Trusted Execution Environment (TEE) Guide. http://www.globalplatform.org/mediaguidetee.asp.Google ScholarGoogle Scholar
  15. Intel. 2014. Intel Trusted Execution Technology (Intel TXT). https://www.intel.com/content/www/us/en/architecture-and-technology/trusted-execution-technology/trusted-execution-technology-security-paper.html.Google ScholarGoogle Scholar
  16. Xuxian Jiang and Xinyuan Wang. 2007. Out-of-the-box Monitoring of VM-based High-Interaction Honeypots. In Proceedings of the 10th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Queensland, Australia, 198--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Xuxian Jiang, Xinyuan Wang, and Dongyan Xu. 2007. Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS). 128--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Vasileios P Kemerlis, Georgios Portokalidis, and Angelos D Keromytis. {n. d.}. kGuard: Lightweight Kernel Protection against Return-to-User Attacks.. In Proceedings of the 21st USENIX Security Symposium (Security). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Matthias Lange, Steffen Liebergeld, Adam Lackorzynski, Alexander Warg, and Michael Peter. 2011. L4Android: a generic operating system framework for secure smartphones. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (SPSM). Chicago, IL, 39--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Hojoon Lee, Hyungon Moon, Ingoo Heo, Daehee Jang, Jinsoo Jang, Kihwan Kim, Yunheung Paek, and Brent Kang. 2017. KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object. IEEE Transactions on Dependable and Secure Computing (2017).Google ScholarGoogle Scholar
  21. Anthony Lineberry. 2009. Malicious Code Injection via/dev/mem. Black Hat Europe (2009), 11.Google ScholarGoogle Scholar
  22. Lionel Litty, H Andrés Lagar-Cavilla, and David Lie. 2008. Hypervisor Support for Identifying Covertly Executing Binaries.. In Proceedings of the 17th USENIX Security Symposium (Security). Boston, MA, 243--258. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Teresa F Lunt and R Jagannathan. 1988. A prototype real-time intrusion-detection expert system. In Proceedings of the 9th IEEE Symposium on Security and Privacy (Oakland). Oakland, CA, 59--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Jonathan M McCune, Bryan J Parno, Adrian Perrig, Michael K Reiter, and Hiroshi Isozaki. 2008. Flicker: An execution infrastructure for TCB minimization. In Proceedings of the 3rd European Conference on Computer Systems (EuroSys). Glasgow, Scotland UK, 315--328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. MITRE. 2017. CVE-2017-15589 Detail. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589.Google ScholarGoogle Scholar
  26. MITRE. 2017. CVE-2017-7228 Detail. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7228.Google ScholarGoogle Scholar
  27. MITRE. 2018. CVE-2018-1068 Detail. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068.Google ScholarGoogle Scholar
  28. MITRE. 2018. CVE-2018-7542 Detail. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542.Google ScholarGoogle Scholar
  29. Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek, and Brent Byunghoon Kang. 2012. Vigilare: toward snoop-based kernel integrity monitor. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS). Raleigh, NC, 28--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, and Sarah Martin. 2016. Trustzone explained: Architectural features and use cases. In Proceedings of the IEEE 2nd International Conference on Collaboration and Internet Computing (CIC). Pittsburgh, PA, 445--451.Google ScholarGoogle ScholarCross RefCross Ref
  31. OP-TEE. 2018. OP-TEE Trusted OS Documentation. https://www.op-tee.org/.Google ScholarGoogle Scholar
  32. Reena Panda, Shuang Song, Joseph Dean, and Lizy K John. 2018. Wait of a Decade: Did SPEC CPU 2017 Broaden the Performance Horizon?. In Proceedings of the 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA). Vienna, Austria, 271--282.Google ScholarGoogle ScholarCross RefCross Ref
  33. Bryan D Payne, Martim Carbone, Monirul Sharif, and Wenke Lee. 2008. Lares: An architecture for secure active monitoring using virtualization. In Proceedings of the 29th IEEE Symposium on Security and Privacy (Oakland). Oakland, CA, 233--247. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Nick L Petroni Jr, Timothy Fraser, AAron Walters, and William A Arbaugh. 2006. An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data.. In Proceedings of the 15th USENIX Security Symposium (Security). Vancouver, Canada, 289--304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Daniel Plastina, Jonathan Cain, and Michael Novak. 2005. Methods, systems, and computer-readable media for generating an ordered list of one or more media items. US Patent App. 11/089,696.Google ScholarGoogle Scholar
  36. Mendel Rosenblum and Tal Garfinkel. 2005. Virtual machine monitors: Current technology and future trends. Computer 38, 5 (2005), 39--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. 2007. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP). Stevenson, WA, 335--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Pavitra Shankdhar. 2018. 22 Popular Computer Forensics Tools {Updated for 2018}. https://resources.infosecinstitute.com/computer-forensics-tools/#gref.Google ScholarGoogle Scholar
  39. Monirul I Sharif, Wenke Lee, Weidong Cui, and Andrea Lanzi. 2009. Secure in-vm monitoring using hardware virtualization. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS). Chicago, IL, 477--487. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Udo Steinberg and Bernhard Kauer. 2010. NOVA: a microhypervisor-based secure virtualization architecture. In Proceedings of the 5th European Conference on Computer Systems (EuroSys). ACM, 209--222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, and Sushil Jajodia. 2014. Trustdump: Reliable memory acquisition on smartphones. In Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS). Wroclaw, Poland, 202--218.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Arijit Ukil, Jaydip Sen, and Sripad Koilakonda. 2011. Embedded security for Internet of Things. In Proceedings of the 2nd National Conference on Emerging Trends and Applications in Computer Science. Shillong, India.Google ScholarGoogle ScholarCross RefCross Ref
  43. USMAN. 2013. Apple's Secure Enclave for Touch ID And Its Importance Detailed. (2013). http://www.iphoneincanada.ca/iphone-5s/apples-new-secure-enclave-details/.Google ScholarGoogle Scholar
  44. Zhi Wang, Xuxian Jiang, Weidong Cui, and Peng Ning. 2009. Countering kernel rootkits with lightweight hook protection. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS). Chicago, IL, 545--554. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. White Paper: An Overview of the Samsung Knox Platform. 2016. Samsung Knox. https://kp-cdn.samsungknox.com/df4184593021d7b8fabfdfeff5c318ba.pdf.Google ScholarGoogle Scholar

Index Terms

  1. iCore: continuous and proactive extrospection on multi-core IoT devices

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing
        April 2019
        2682 pages
        ISBN:9781450359337
        DOI:10.1145/3297280

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 April 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,650of6,669submissions,25%
      • Article Metrics

        • Downloads (Last 12 months)17
        • Downloads (Last 6 weeks)2

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader