Skip to main content
CenXiv.org
This website is in trial operation, support us!
We gratefully acknowledge support from all contributors.
Contribute
Donate
cenxiv logo > cs > arXiv:2411.01377

Help | Advanced Search

Computer Science > Cryptography and Security

arXiv:2411.01377 (cs)
[Submitted on 2 Nov 2024 ]

Title: How Memory-Safe is IoT? Assessing the Impact of Memory-Protection Solutions for Securing Wireless Gateways

Title: 物联网有多安全? 评估内存保护解决方案对安全无线网关的影响

Authors:Vadim Safronov, Ionut Bostan, Nicholas Allott, Andrew Martin
Abstract: The rapid development of the Internet of Things (IoT) has enabled novel user-centred applications, including many in safety-critical areas such as healthcare, smart environment security, and emergency response systems. The diversity in IoT manufacturers, standards, and devices creates a combinatorial explosion of such deployment scenarios, leading to increased security and safety threats due to the difficulty of managing such heterogeneity. In almost every IoT deployment, wireless gateways are crucial for interconnecting IoT devices and providing services, yet they are vulnerable to external threats and serve as key entry points for large-scale IoT attacks. Memory-based vulnerabilities are among the most serious threats in software, with no universal solution yet available. Legacy memory protection mechanisms, such as canaries, RELRO, NX, and Fortify, have enhanced memory safety but remain insufficient for comprehensive protection. Emerging technologies like ARM-MTE, CHERI, and Rust are based on more universal and robust Secure-by-Design (SbD) memory safety principles, yet each entails different trade-offs in hardware or code modifications. Given the challenges of balancing security levels with associated overheads in IoT systems, this paper explores the impact of memory safety on the IoT domain through an empirical large-scale analysis of memory-related vulnerabilities in modern wireless gateways. Our results show that memory vulnerabilities constitute the majority of IoT gateway threats, underscoring the necessity for SbD solutions, with the choice of memory-protection technology depending on specific use cases and associated overheads.
Abstract: 物联网(IoT)的快速发展使以用户为中心的新应用成为可能,包括医疗保健、智能环境安全和应急响应系统等关键安全领域。物联网制造商、标准和设备的多样性导致了此类部署场景的组合爆炸,由于难以管理这种异构性,从而增加了安全和安全隐患。在几乎每个物联网部署中,无线网关对于连接物联网设备和提供服务至关重要,但它们容易受到外部威胁,并且是大规模物联网攻击的关键入口。基于内存的漏洞是软件中最严重的威胁之一,目前尚无通用解决方案。传统的内存保护机制,如canaries、RELRO、NX和Fortify,虽然增强了内存安全性,但对全面保护仍显不足。像ARM-MTE、CHERI和Rust这样的新兴技术基于更普遍和强大的设计安全(SbD)内存安全原则,但每种技术在硬件或代码修改方面都有不同的权衡。鉴于物联网系统中平衡安全级别与相关开销的挑战,本文通过对外部无线网关中内存相关漏洞的实证大规模分析,探讨了内存安全对物联网领域的影响。我们的结果表明,内存漏洞构成了物联网网关威胁的大部分,强调了SbD解决方案的必要性,而内存保护技术的选择则取决于具体的使用案例和相关开销。
Comments: This paper has been accepted at the 1st International Workshop on Internet of Things for Safety-Critical Cyber-Physical Systems (IoT4safety '24), included in the proceedings of the ACM 14th International Conference on the Internet of Things (IoT '24)
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:2411.01377 [cs.CR]
  (or arXiv:2411.01377v1 [cs.CR] for this version)
  https://doi.org/10.48550/arXiv.2411.01377
arXiv-issued DOI via DataCite

Submission history

From: Vadim Safronov [view email]
[v1] Sat, 2 Nov 2024 23:00:37 UTC (375 KB)
Full-text links:

Access Paper:

    View a PDF of the paper titled
  • View Chinese PDF
  • View PDF
  • HTML (experimental)
  • TeX Source
  • Other Formats
license icon view license
Current browse context:
cs.CR
< prev   |   next >
new | recent | 2024-11
Change to browse by:
cs

References & Citations

  • NASA ADS
  • Google Scholar
  • Semantic Scholar
a export BibTeX citation Loading...

BibTeX formatted citation

×
Data provided by:

Bookmark

BibSonomy logo Reddit logo

Bibliographic and Citation Tools

Bibliographic Explorer (What is the Explorer?)
Connected Papers (What is Connected Papers?)
Litmaps (What is Litmaps?)
scite Smart Citations (What are Smart Citations?)

Code, Data and Media Associated with this Article

alphaXiv (What is alphaXiv?)
CatalyzeX Code Finder for Papers (What is CatalyzeX?)
DagsHub (What is DagsHub?)
Gotit.pub (What is GotitPub?)
Hugging Face (What is Huggingface?)
Papers with Code (What is Papers with Code?)
ScienceCast (What is ScienceCast?)

Demos

Replicate (What is Replicate?)
Hugging Face Spaces (What is Spaces?)
TXYZ.AI (What is TXYZ.AI?)

Recommenders and Search Tools

Influence Flower (What are Influence Flowers?)
CORE Recommender (What is CORE?)
IArxiv Recommender (What is IArxiv?)
  • Author
  • Venue
  • Institution
  • Topic

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs.

Which authors of this paper are endorsers? | Disable MathJax (What is MathJax?)
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack

京ICP备2025123034号