Skip to main content

Showing 1–9 of 9 results for author: Jakkamsetti, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.04308  [pdf, other

    cs.CR

    Towards Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices

    Authors: Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik

    Abstract: Lower-end IoT devices typically have strict cost constraints that rule out usual security mechanisms available in general-purpose computers or higher-end devices. To secure low-end devices, various low-cost security architectures have been proposed for remote verification of their software state via integrity proofs. These proofs vary in terms of expressiveness, with simpler ones confirming correc… ▽ More

    Submitted 10 January, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

  2. Poster: Control-Flow Integrity in Low-end Embedded Devices

    Authors: Sashidhar Jakkamsetti, Youngil Kim, Andrew Searles, Gene Tsudik

    Abstract: Embedded, smart, and IoT devices are increasingly popular in numerous everyday settings. Since lower-end devices have the most strict cost constraints, they tend to have few, if any, security features. This makes them attractive targets for exploits and malware. Prior research proposed various security architectures for enforcing security properties for resource-constrained devices, e.g., via Remo… ▽ More

    Submitted 20 September, 2023; v1 submitted 19 September, 2023; originally announced September 2023.

    Comments: The idea mentioned in the paper is still under development. This is an early version without full results. This version is only as a poster accepted at ACM CCS 2023

  3. Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence (Full Version)

    Authors: Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik

    Abstract: As many types of IoT devices worm their way into numerous settings and many aspects of our daily lives, awareness of their presence and functionality becomes a source of major concern. Hidden IoT devices can snoop (via sensing) on nearby unsuspecting users, and impact the environment where unaware users are present, via actuation. This prompts, respectively, privacy and security/safety issues. The… ▽ More

    Submitted 8 September, 2023; v1 submitted 7 September, 2023; originally announced September 2023.

    Comments: 17 pages, 11 figures. To appear at ACM CCS 2023

  4. arXiv:2308.11921  [pdf, other

    cs.CR

    PARseL: Towards a Verified Root-of-Trust over seL4

    Authors: Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik

    Abstract: Widespread adoption and growing popularity of embedded/IoT/CPS devices make them attractive attack targets. On low-to-mid-range devices, security features are typically few or none due to various constraints. Such devices are thus subject to malware-based compromise. One popular defensive measure is Remote Attestation (RA) which allows a trusted entity to determine the current software integrity o… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

    Comments: 8 pages and 8 figures. To be published at IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2023

  5. arXiv:2209.00813  [pdf, other

    cs.CR cs.AR

    CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems

    Authors: Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik

    Abstract: Guaranteeing runtime integrity of embedded system software is an open problem. Trade-offs between security and other priorities (e.g., cost or performance) are inherent, and resolving them is both challenging and important. The proliferation of runtime attacks that introduce malicious code (e.g., by injection) into embedded devices has prompted a range of mitigation techniques. One popular approac… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

    Comments: 10 pages, 9 figures, To appear at ICCAD 2022

  6. arXiv:2205.02963  [pdf, other

    cs.CR cs.AR

    Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA

    Authors: Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, Gene Tsudik

    Abstract: There are many well-known techniques to secure sensed data in IoT/CPS systems, e.g., by authenticating communication end-points, encrypting data before transmission, and obfuscating traffic patterns. Such techniques protect sensed data from external adversaries while assuming that the sensing device itself is secure. Meanwhile, both the scale and frequency of IoT-focused attacks are growing. This… ▽ More

    Submitted 5 May, 2022; originally announced May 2022.

    Comments: 13 pages paper and 4 pages appendix. To be published at 2022 IEEE Symposium on Security and Privacy

  7. arXiv:2103.12928  [pdf, other

    cs.CR cs.AR

    DIALED: Data Integrity Attestation for Low-end Embedded Devices

    Authors: Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Gene Tsudik

    Abstract: Verifying integrity of software execution in low-end micro-controller units (MCUs) is a well-known open problem. The central challenge is how to securely detect software exploits with minimal overhead, since these MCUs are designed for low cost, low energy and small size. Some recent work yielded inexpensive hardware/software co-designs for remotely verifying code and execution integrity. In parti… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: 6 pages, to be published in DAC 2021

  8. arXiv:2011.07400  [pdf, other

    cs.CR cs.AR

    Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution

    Authors: Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Gene Tsudik

    Abstract: The design of tiny trust anchors has received significant attention over the past decade, to secure low-end MCU-s that cannot afford expensive security mechanisms. In particular, hardware/software (hybrid) co-designs offer low hardware cost, while retaining similar security guarantees as (more expensive) hardware-based techniques. Hybrid trust anchors support security services, such as remote atte… ▽ More

    Submitted 14 December, 2020; v1 submitted 14 November, 2020; originally announced November 2020.

  9. arXiv:2005.03873  [pdf, other

    cs.CR

    On the TOCTOU Problem in Remote Attestation

    Authors: Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik

    Abstract: We propose Remote Attestation with TOCTOU Avoidance (RATA): a provably secure approach to address the RA TOCTOU problem. With RATA, even malware that erases itself before execution of the next RA, can not hide its ephemeral presence. RATA targets hybrid RA architectures (implemented as Hardware/Software co-designs), which are aimed at low-end embedded devices. We present two alternative techniques… ▽ More

    Submitted 15 April, 2021; v1 submitted 8 May, 2020; originally announced May 2020.