Securing Real-Time Microcontroller Systems through Customized Memory View Switching
Slide-deck for Graduate Computer Security (CS563) Fall 2018 University of Illinois
- Prof. Adam Bates
Securing Real-Time Microcontroller Systems through Customized Memory - - PowerPoint PPT Presentation
Slide-deck for Graduate Computer Security (CS563) Fall 2018 University of Illinois Prof. Adam Bates Securing Real-Time Microcontroller Systems through Customized Memory View Switching Wh What are Real-ti time Mi Microcontrollers?
megabytes.
Electronics, Sensor Networks
Se Security So Solution : MINION
regions essential to correctly
analysis
memory-views
unprivileged processes
Me Memory View Ta Tailoring
regions essential , per- process
Cod Code Reachability An Analysis
the entry functions
handlers
RTOS functions
inter-procedural points-to analysis
regions for each process
Da Data Reachability An Analysis
inter-procedural value flow graph
for each process
profiling with annotated memory allocator
allocation GlobA 200010f0-200010f4 RW GlobB 20014618-20014638 RW GlobC 080b3428-080b3440 R main foo bar baz irq_handler LDR r8, GlobA STR r2, GlobA LDR r0, GlobB LDR r2, GlobC STR r5, GlobB
De Device Reachability An Analysis
with an MMIO address
procedural value flow graph
mapped memory regions for each process enable_irq irqinfo main dev_reset hw_initialize DEVICE_X 50000804-50000808 W NVIC_A e000e100-e000e104 RW NVIC_B e000e104-e000e108 RW
# Base Size rwx
# Base Size rwx # Base Size rwx
P1 P2
# Base Size rwx # Base Size rwx
Process Switch
# Base Size rwx
Re-configure Configure
15.55 11.25 33.63 3.32 52.02 3.31 2.19 1.89 56.49 13.74 3.41 6.13 24.18 2.78 10.03 2.21 2.81 2.92 10.61 60.28 3.56 62.22 52.38 5.25 4.03 5.22 2.5 5.48 2.36 1.8 1.68 19.57 10.85 35.22 2.18 65.04 3.45 1.76 1.97 58.12 20.57 3.31 9.6 29.03 3.64 9.31 4.62 3.66 2.5 15.04 66.92 3.57 64.81 59.23 4.76 3.07 5.55 7.62 5.09 2.86 3.88 2.76 130 75 200 160 120 50 50 75 140 100 90 75 100 90 90 75 75 50 180 110 550 550 75 350 110 100 75 75 200 75 75 1 1 0 1 0 1 0 0 0 1 0 0 0 0
r c _ l
t h r
t l e _ l
u p d a t e _ G P S u p d a t e _
t i c a l _ f l
u p d a t e _ b a t t _ c
p a s s r e a d _ a u x _ s w i t c h e s a r m _ m
s _ c h e c k a u t
t r i m u p d a t e _ a l t i t u d e r u n _ n a v _ u p d a t e s u p d a t e _ t h r _ a v e r a g e t h r e e _ h z _ l
c
p a s s _ a c c u m u l a t e b a r
e t e r _ a c c u m u l a t e u p d a t e _ n
i f y e k f _ c h e c k l a n d i n g g e a r _ u p d a t e l
t _ v e h i c l e _ c h e c k g c s _ c h e c k _ i n p u t g c s _ s e n d _ h e a r t b e a t g c s _ s e n d _ d e f e r r e d g c s _ d a t a _ s t r e a m _ s e n d u p d a t e _ m
n t t e n _ h z _ l
g i n g _ l
f i f t y _ h z _ l
g i n g _ l
f u l l _ r a t e _ l
g i n g _ l
p e r f _ u p d a t e r e a d _ r e c e i v e r _ r s s i r p m _ u p d a t e f r s k y _ t e l e m e t r y _ s e n d e p m _ u p d a t e
Time in μsec (Log-scale) Unprote cte d Prote cte d De adline
limited access control protection between views
and redeployment.
provide increased isolation guarantees between RTOS and the View Switcher