TRUSTED BUILDING BLOCKS FOR RESILIENT EMBEDDED SYSTEMS DESIGN

dc.contributor.advisorPatel, Chintan
dc.contributor.advisorBanerjee, Nilanjan
dc.contributor.authorDave, Avani
dc.contributor.departmentComputer Science and Electrical Engineering
dc.contributor.programEngineering, Computer
dc.date.accessioned2022-09-29T15:37:46Z
dc.date.available2022-09-29T15:37:46Z
dc.date.issued2021-01-01
dc.description.abstractThe use of small embedded and IoT devices have increased monumentally with technological advancements and industry 4.0 evolution. These devices are widely used in applications ranging from home security systems, sensors network, smart appliances, industrial control systems, and Electronic Control Units (ECU)'s in cars. They are used to collect, process, and transfer security-critical user information and data. Attackers can leak, steal, modify and misuse their security critical information in malicious activities. Thus, the security and assurance that the device runs untempered, vendor authorized trusted code becomes an open security problem. Secure boot and remote attestation (RA) are widely used security primitives that verifies the integrity and authenticity of the software code running on the devices at boot-time and periodic runtime, respectively. TPM2.0 and trust-zone based complex hybrid solutions provides different categories of attacks detection and prevention with the use of access control and encryption. Other techniques such as control flow and data flow attestation are widely used for detecting malicious code execution during runtime. Secure-boot and RA focuses on the detection of malicious code presents and leaves the device un-operational state. They relies on manual or over-the-air or code re-flash to bring the device back to the operational state. The resilience of the embedded device is defined as, its ability to detect the presence of different types of attacks, prevent them from being executed and provide the recovery techniques to bring the device back to the normal operational state. Smart attacks can corrupt the networking stack to disable over the air code re-flashing and due to placing of the devices in industrial control plants, ECU's, smart cameras , manual code reflash sometimes becomes not viable solution. The resilient small embedded system design needs attacks detection, prevention and recovery at both boot-time and continues runtime.Therefore, this dissertations outlines several solutions for augmenting attack resiliency in small embedded and IOT devices. The techniques can be easily adapted to existing systems as they requires very little or no hardware overhead. The dissertations first implements TPM2.0 based end-to-end device attestation technique with TLV format of the event logs. It than showcases two different implementation of lightweight attack detection, prevention and onboard recovery techniques. lastly, it presents lightweight novel control register based continuous runtime resilience techniques. The hybrid solutions have been implemented and tested on the FPGA for Proof Of Concept (POC) validation. The results of the state-of-the-art comparison and evaluation are presented. Furthermore, to demonstrate that the proposed solution adheres the security and specifications, a novel end-to-end formal verification framework is proposed to gain the confidence in the system design. Thus, these dissertations paves the way for attack resilient embedded systems design and provides explores the future research direction.
dc.formatapplication:pdf
dc.genredissertations
dc.identifierdoi:10.13016/m2dqvu-uelm
dc.identifier.other12483
dc.identifier.urihttp://hdl.handle.net/11603/25964
dc.languageen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Theses and Dissertations Collection
dc.relation.ispartofUMBC Graduate School Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please see http://aok.lib.umbc.edu/specoll/repro.php or contact Special Collections at speccoll(at)umbc.edu
dc.sourceOriginal File Name: Dave_umbc_0434D_12483.pdf
dc.subjectremote attestation
dc.subjectResilient system design
dc.subjectrisc-v
dc.subjectsecure-boot
dc.subjectsecurity
dc.subjectsmall embedded IOT devices
dc.titleTRUSTED BUILDING BLOCKS FOR RESILIENT EMBEDDED SYSTEMS DESIGN
dc.typeText
dcterms.accessRightsDistribution Rights granted to UMBC by the author.
dcterms.accessRightsAccess limited to the UMBC community. Item may possibly be obtained via Interlibrary Loan thorugh a local library, pending author/copyright holder's permission.

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Dave_umbc_0434D_12483.pdf
Size:
5.57 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Dave-Avani_Open.pdf
Size:
193.92 KB
Format:
Adobe Portable Document Format
Description: