SRACARE: Secure Remote Attestation with Code Authentication and Resilience Engine

dc.contributor.authorDave, Avani
dc.contributor.authorBanerjee, Nilanjan
dc.contributor.authorPatel, Chintan
dc.date.accessioned2021-02-04T18:47:06Z
dc.date.available2021-02-04T18:47:06Z
dc.date.issued2020-12
dc.description2020 IEEE International Conference on Embedded Software and Systems (ICESS), 10-11 Dec. 2020,Shanghai, Chinaen_US
dc.description.abstractRecent technological advancements have enabled proliferated use of small embedded and IoT devices for collecting, processing, and transferring the security-critical information and user data. This exponential use has acted as a catalyst in the recent growth of sophisticated attacks such as the replay, man-in-the-middle, and malicious code modification to slink, leak, tweak or exploit the security-critical information in malevolent activities. Therefore, secure communication and software state assurance (at run-time and boot-time) of the device has emerged as open security problems. Furthermore, these devices need to have an appropriate recovery mechanism to bring them back to the known-good operational state. Previous researchers have demonstrated independent methods for attack detection and safeguard. However, the majority of them lack in providing onboard system recovery and secure communication techniques. To bridge this gap, this manuscript proposes SRACARE - a framework that utilizes the custom lightweight, secure communication protocol that performs remote/local attestation, and secure boot with an onboard resilience recovery mechanism to protect the devices from the above-mentioned attacks. The prototype employs an efficient lightweight, low-power 32-bit RISC-V processor, secure communication protocol, code authentication, and resilience engine running on the Artix 7 Field Programmable Gate Array (FPGA) board. This work presents the performance evaluation and state-of-the-art comparison results, which shows promising resilience to attacks and demonstrate the novel protection mechanism with onboard recovery. The framework achieves these with only 8% performance overhead and a very small increase in hardware-software footprint.en_US
dc.description.urihttps://ieeexplore.ieee.org/document/9301516en_US
dc.format.extent8 pagesen_US
dc.genreconference papers and proceedings preprintsen_US
dc.identifierdoi:10.13016/m2fvtk-4zei
dc.identifier.citationAvani Dave, Nilanjan Banerjee and Chintan Patel, SRACARE: Secure Remote Attestation with Code Authentication and Resilience Engine, 2020 IEEE International Conference on Embedded Software and Systems, DOI: 10.1109/ICESS49830.2020.9301516en_US
dc.identifier.urihttps://doi.org/10.1109/ICESS49830.2020.9301516
dc.identifier.urihttp://hdl.handle.net/11603/20940
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.titleSRACARE: Secure Remote Attestation with Code Authentication and Resilience Engineen_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2101.06148.pdf
Size:
893.07 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: