|Title||On the Security of Safety-Critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?|
|Publication Type||Conference Paper|
|Year of Publication||2017|
|Authors||Moreno, C., and S. Fischmeister|
|Conference Name||International Conference on Information Systems Security and Privacy (ICISSP)|
|Conference Location||Porto, Portugal.|
The increased level of connectivity makes security an essential aspect to ensure that safety-critical embedded systems deliver the level of safety for which they were designed. However, embedded systems designers face unique technological and economics challenges when incorporating security into their products. In this paper, we focus on two of these challenges unique to embedded systems, and propose novel approaches to address them. We ﬁrst deal with the difﬁculties in successfully implementing runtime monitoring to ensure correctness in the presence of security threats. We highlight the necessity to implement runtime monitors as physically isolated subsystems, preferably with no (direct) connectivity, and we propose the use of program tracing through power consumption to this end. A second critical aspect is that of remote ﬁrmware upgrades: this is an essential mechanism to ensure the continuing security of a system, yet the mechanism itself can introduce severe security vulnerabilities. We propose a novel approach to ensure secure remote upgrades and sketch the details of an eventual implementation. It is our goal and hope that the computer security and embedded systems communities will discuss and evaluate the ideas that we present in this paper, to assess their effectiveness and applicability in practice.
(Associated poster nominated for Best Poster Award)
On the Security of Safety-Critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?