论文标题
像1996年一样建造嵌入式系统
Building Embedded Systems Like It's 1996
论文作者
论文摘要
嵌入式设备无处不在。但是,初步证据表明,嵌入式设备中缺少保护我们的台式机/服务器/电话的攻击缓解,对嵌入式安全性构成了重大威胁。为此,本文介绍了一项关于采用嵌入式设备的常见攻击缓解的深入研究。确切地说,它衡量在超过10K Linux的部署嵌入式设备的固件中,对内存损坏的标准缓解措施的存在。 该研究表明,嵌入式设备在很大程度上忽略了用户空间和内核级攻击缓解。嵌入式设备上的采用率比其桌面对应物低多次。同样重要的观察结果是,这种情况不会随着时间的流逝而改善。如果不改变当前的做法,攻击缓解将仍然缺失,这可能会成为即将到来的物联网时代更大的威胁。 在整个后续分析中,我们进一步推断了一组可能导致缺乏攻击的因素。模范包括大量重复使用非保护软件,升级过时的内核以及自动建筑工具施加的限制。我们设想这些将变成见解,以改善将来对嵌入式设备的攻击缓解。
Embedded devices are ubiquitous. However, preliminary evidence shows that attack mitigations protecting our desktops/servers/phones are missing in embedded devices, posing a significant threat to embedded security. To this end, this paper presents an in-depth study on the adoption of common attack mitigations on embedded devices. Precisely, it measures the presence of standard mitigations against memory corruptions in over 10k Linux-based firmware of deployed embedded devices. The study reveals that embedded devices largely omit both user-space and kernel-level attack mitigations. The adoption rates on embedded devices are multiple times lower than their desktop counterparts. An equally important observation is that the situation is not improving over time. Without changing the current practices, the attack mitigations will remain missing, which may become a bigger threat in the upcoming IoT era. Throughout follow-up analyses, we further inferred a set of factors possibly contributing to the absence of attack mitigations. The exemplary ones include massive reuse of non-protected software, lateness in upgrading outdated kernels, and restrictions imposed by automated building tools. We envision these will turn into insights towards improving the adoption of attack mitigations on embedded devices in the future.