YoVDO

OAT - Attesting Operation Integrity of Embedded Devices

Offered By: IEEE via YouTube

Tags

Embedded Systems Security Courses IoT security Courses Remote Attestation Courses

Course Description

Overview

Explore a comprehensive IEEE conference talk on OAT (Operation Attestation), a novel system for attesting operation integrity of embedded devices in IoT/CPS systems. Learn about the formulation of Operation Execution Integrity (OEI) and how OAT enables remote attestation for ARM-based bare-metal embedded devices. Discover the innovative control-flow measurement scheme, abstract execution for remote verification, and lightweight integrity checking for critical data. Understand the security implications, including detection of control flow hijacks and data-only attacks on IoT devices. Examine the implementation details, performance tests, and security analysis of OAT, which achieves a 97% space reduction in measurement collection and a 74% reduction in instrumentation compared to previous approaches, while incurring only a 2.7% runtime overhead.

Syllabus

Intro
The unverifiable (blind) trust
Existing solutions -- attestation
Example: vulnerable robotic arm
Our Solution
OEI (Operation Exec. Integrity)
OEI: two sub-properties
Attestation Challenges
OAT (OEI Attestation Framework)
Threat model
Operations
CFI Attestation
Intuitive measurement schemes
A hybrid scheme
Measurement Collection & Verification
Critical variable identification
Existing data integrity checks
Def-Use Value Integrity (DVI)
Implementation notes
Tests on real embedded firmware
Micro Performance Tests
Comparisons
Security Tests & Analysis
Conclusion


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Exploring Modern and Secure Operations of Kubernetes Clusters on the Edge
Open Data Science via YouTube
Using the Observer Effect and Cyber Feng Shui - Jacob Torrey
Hack In The Box Security Conference via YouTube
The Remote Working Security Conundrum - What Is Reasonably Secure Anyway?
USENIX via YouTube
Riverbed - Enforcing User-defined Privacy Constraints in Distributed Web Services
USENIX via YouTube
Using TPMs to Cryptographically Verify Devices at Scale
Linux Foundation via YouTube