ATRIUM: Runtime Attestation Resilient Under Memory Attacks

AuthorZeitouni, Shaza; Dessouky, Ghada; Arias, Orlando; Sullivan, Dean; Ibrahim, Ahmad; Jin, Yier; Sadeghi, Ahmad-Reza
TypeConference Proceedings
AbstractRemote attestation is an important security service that allows a trusted party (verifier) to verify the integrity of the software running on a remote and potentially compromised device (prover). The security of existing remote attestation schemes relies on the assumptions that attacks are software-only and the prover's code cannot be modified at runtime. However, in practice, these schemes can be bypassed in a stronger and more realistic adversary model with physical access to (either off-chip or on-chip) code memory and is hereby capable of controlling and modifying code memory to attest benign code but execute malicious code instead -- leaving the underlying system vulnerable to Time of Check Time of Use (TOCTOU) attacks. In this paper, we first show how to successfully launch TOCTOU attacks on some recently proposed attestation schemes by exploiting physical access to code memory. Then we present the design and proof-of-concept implementation of SMARTER, the first practical runtime remote attestation system that securely attests both the code's binary and its execution in the mentioned stronger adversary model. SMARTER provides resilience against both software- and hardware-based TOCTOU attacks, while incurring minimal area and performance overhead.
In2017 International Conference On Computer Aided Design (ICCAD'17)