Presentation subtitle: 20pt Arial Regular, green R223 | G255 | B102 Recommended maximum length: 2 lines Confidentiality/date line: 13pt Arial Regular,

Slides:



Advertisements
Similar presentations
Confidentiality/date line: 13pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either side Disclaimer.
Advertisements

PSeries Advanced Technical Support © 2002 IBM Corporation Presentation subtitle: 20pt Arial Regular, teal R045 | G182 | B179 Recommended maximum length:
System Model Construction Prof. J. Stankovic University of Virginia Spring 2015.
IBM Retail Store Solutions November 2003 Presentation subtitle: 20pt Arial Regular, teal R045 | G182 | B179 Recommended maximum length: 2 lines Confidentiality/date.
Active Technologies - HRL Active Technologies | 14/04/03 Presentation subtitle: 20pt Arial Regular, teal R045 | G182 | B179 Recommended maximum length:
Presentation subtitle: 20pt Arial Regular, teal R045 | G182 | B179 Recommended maximum length: 2 lines Confidentiality/date line: 13pt Arial Regular, white.
IBM Software Group © 2006 IBM Corporation Confidentiality/date line: 13pt Arial Regular, white Maximum length: 1 line Information separated by vertical.
Organization for the Advancement of Structured Information Standards OASIS | March 04, 2003 Presentation subtitle: 20pt Arial Regular, teal R045 | G182.
© 2007 IBM Corporation Storage Area Network Management Modeling Simulation Eclipse Aperi SAN Simulator Ramani Routray.
IBM CONFIDENTIAL | PREPARED BY IBM ATTORNEY Presentation subtitle: 20pt Arial Regular, teal R045 | G182 | B179 Recommended maximum length: 2 lines Confidentiality/date.
IBM India Presentation subtitle: 20pt Arial Regular, teal R045 | G182 | B179 Recommended maximum length: 2 lines Confidentiality/date line: 13pt Arial.
IBM Research © 2008 IBM Corporation Confidentiality/date line: 13pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes,
Presentation transcript:

Presentation subtitle: 20pt Arial Regular, green R223 | G255 | B102 Recommended maximum length: 2 lines Confidentiality/date line: 13pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either side Disclaimer information may also be appear in this area. Place flush left, aligned at bottom, 8-10pt Arial Regular, white Indications in green = Live content Indications in white = Edit in master Indications in blue = Locked elements Indications in black = Optional elements Presentation title: 28pt Arial Regular, white Recommended maximum length: 2 lines Group name: 17pt Arial Regular, white Maximum length: 1 line Copyright: 10pt Arial Regular, white February 22-23, 2007 | ARO Planning Workshop, Raleigh, NC Securing Embedded Software using Software Dynamic Translation Jack W. Davidson and Jason Hiser University of Virginia

Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either side Slide heading: 28pt Arial Regular, light blue R204 | G204 | B255 Maximum length: 2 lines Slide body: 18pt Arial Regular, white Square bullet color: green R223 | G255 | B102 Recommended maximum text length: 5 principal points Group name: 18pt Arial Regular, white Maximum length: 1 line Copyright: 10pt Arial Regular, white February 22-23, 2007 | Securing Embedded Software Using Dynamic Translation Optional slide number: 10pt Arial Bold, white Indications in green = Live content Indications in white = Edit in master Indications in blue = Locked elements Indications in black = Optional elements ARO Planning Workshop on Embedded Systems and Network Security 2 Problem  Embedded systems key building blocks of nation’s vital infrastructure –Communication systems –Transportation and navigation systems –Financial systems –Power distribution systems –Defense systems –Etc.  System functionality is increasingly provided by software instead of hardware  Must protect the software in these systems from malicious observation and tampering

Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either side Slide heading: 28pt Arial Regular, light blue R204 | G204 | B255 Maximum length: 2 lines Slide body: 18pt Arial Regular, white Square bullet color: green R223 | G255 | B102 Recommended maximum text length: 5 principal points Group name: 18pt Arial Regular, white Maximum length: 1 line Copyright: 10pt Arial Regular, white February 22-23, 2007 | Securing Embedded Software Using Dynamic Translation Optional slide number: 10pt Arial Bold, white Indications in green = Live content Indications in white = Edit in master Indications in blue = Locked elements Indications in black = Optional elements ARO Planning Workshop on Embedded Systems and Network Security 3 Threat model  Adversary has physical access to system  Adversary controls execution environment – Execute directly and observe – Simulate and observe – Provide false inputs – Run repeatedly – Use sophisticated dynamic analysis tools  White-box attack where the adversary “holds all the cards” – Example, HD protection recently cracked ( 4/aacs_hack/)

Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either side Slide heading: 28pt Arial Regular, light blue R204 | G204 | B255 Maximum length: 2 lines Slide body: 18pt Arial Regular, white Square bullet color: green R223 | G255 | B102 Recommended maximum text length: 5 principal points Group name: 18pt Arial Regular, white Maximum length: 1 line Copyright: 10pt Arial Regular, white February 22-23, 2007 | Securing Embedded Software Using Dynamic Translation Optional slide number: 10pt Arial Bold, white Indications in green = Live content Indications in white = Edit in master Indications in blue = Locked elements Indications in black = Optional elements ARO Planning Workshop on Embedded Systems and Network Security 4 Our Approach: Software Dynamic Translation  Any software that intercepts, controls, or modifies a program as it runs  Subsumes: –Dynamic optimization / compilation –Dynamic binary translation –Dynamic instrumentation (e.g., profiling) –Host virtualization –Debugging

Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either side Slide heading: 28pt Arial Regular, light blue R204 | G204 | B255 Maximum length: 2 lines Slide body: 18pt Arial Regular, white Square bullet color: green R223 | G255 | B102 Recommended maximum text length: 5 principal points Group name: 18pt Arial Regular, white Maximum length: 1 line Copyright: 10pt Arial Regular, white February 22-23, 2007 | Securing Embedded Software Using Dynamic Translation Optional slide number: 10pt Arial Bold, white Indications in green = Live content Indications in white = Edit in master Indications in blue = Locked elements Indications in black = Optional elements ARO Planning Workshop on Embedded Systems and Network Security 5 Using SDT for Obfuscation and Anti-tampering

Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either side Slide heading: 28pt Arial Regular, light blue R204 | G204 | B255 Maximum length: 2 lines Slide body: 18pt Arial Regular, white Square bullet color: green R223 | G255 | B102 Recommended maximum text length: 5 principal points Group name: 18pt Arial Regular, white Maximum length: 1 line Copyright: 10pt Arial Regular, white February 22-23, 2007 | Securing Embedded Software Using Dynamic Translation Optional slide number: 10pt Arial Bold, white Indications in green = Live content Indications in white = Edit in master Indications in blue = Locked elements Indications in black = Optional elements ARO Planning Workshop on Embedded Systems and Network Security 6 Benefits  Prevents static disassembly and analysis –Code is encrypted on disk –Must run SDT system to materialize code  Provides dynamic obfuscation of code –Natural obfuscation of code by SDT system –Dynamically apply obfuscations  Prevents manipulation of running code –Guards prevent changing application or SDT system –Fragment cache is protected  Limits leakage of information –Flush fragment cache frequently –Multiple runs provide less advantage to attacker  Provides diverse implementations –Dynamic transformations applied randomly –Weakness or vulnerability discovered in one instance not necessarily exploitable in other instances

Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either side Slide heading: 28pt Arial Regular, light blue R204 | G204 | B255 Maximum length: 2 lines Slide body: 18pt Arial Regular, white Square bullet color: green R223 | G255 | B102 Recommended maximum text length: 5 principal points Group name: 18pt Arial Regular, white Maximum length: 1 line Copyright: 10pt Arial Regular, white February 22-23, 2007 | Securing Embedded Software Using Dynamic Translation Optional slide number: 10pt Arial Bold, white Indications in green = Live content Indications in white = Edit in master Indications in blue = Locked elements Indications in black = Optional elements ARO Planning Workshop on Embedded Systems and Network Security 7 Research challenges for anti-tampering in embedded systems  Develop metrics for evaluating degree of obfuscation and resistance to tampering  Managing overhead (both space and time) in constrained-resource systems  Satisfying real-time requirements  Investigate melding low-cost hardware approaches (suitable for widely deployed embedded systems) and SDT approach  Many others …

Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either side Slide heading: 28pt Arial Regular, light blue R204 | G204 | B255 Maximum length: 2 lines Slide body: 18pt Arial Regular, white Square bullet color: green R223 | G255 | B102 Recommended maximum text length: 5 principal points Group name: 18pt Arial Regular, white Maximum length: 1 line Copyright: 10pt Arial Regular, white February 22-23, 2007 | Securing Embedded Software Using Dynamic Translation Optional slide number: 10pt Arial Bold, white Indications in green = Live content Indications in white = Edit in master Indications in blue = Locked elements Indications in black = Optional elements ARO Planning Workshop on Embedded Systems and Network Security 8 Limiting leakage of information

Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either side Slide heading: 28pt Arial Regular, light blue R204 | G204 | B255 Maximum length: 2 lines Slide body: 18pt Arial Regular, white Square bullet color: green R223 | G255 | B102 Recommended maximum text length: 5 principal points Group name: 18pt Arial Regular, white Maximum length: 1 line Copyright: 10pt Arial Regular, white February 22-23, 2007 | Securing Embedded Software Using Dynamic Translation Optional slide number: 10pt Arial Bold, white Indications in green = Live content Indications in white = Edit in master Indications in blue = Locked elements Indications in black = Optional elements ARO Planning Workshop on Embedded Systems and Network Security 9 Runtime Overhead