About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings

Research Article

Breaking Embedded Software Homogeneity with Protocol Mutations

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-25538-0_40,
        author={Tongwei Ren and Ryan Williams and Sirshendu Ganguly and Lorenzo De Carli and Long Lu},
        title={Breaking Embedded Software Homogeneity with Protocol Mutations},
        proceedings={Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
        proceedings_a={SECURECOMM},
        year={2023},
        month={2},
        keywords={Software diversity Protocol mutations MTD},
        doi={10.1007/978-3-031-25538-0_40}
    }
    
  • Tongwei Ren
    Ryan Williams
    Sirshendu Ganguly
    Lorenzo De Carli
    Long Lu
    Year: 2023
    Breaking Embedded Software Homogeneity with Protocol Mutations
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-031-25538-0_40
Tongwei Ren1, Ryan Williams2, Sirshendu Ganguly1, Lorenzo De Carli1,*, Long Lu2
  • 1: Worcester Polytechnic Institute, Worcester
  • 2: Northeastern University, Boston
*Contact email: ldecarli@wpi.edu

Abstract

Network-connected embedded devices suffer from easy-to-exploit security issues. Due to code and platform reuse the same vulnerability oftentimes ends up affecting a large installed base. These circumstances enable destructive types of attacks, like ones in which compromised devices disrupt the power grid.

We tackle an enabling factors of these attacks: software homogeneity. We propose techniques to inject syntax mutations in application-level network protocols used in the embedded/IoT space. Our approach makes it easy to diversify a protocol into syntactically different dialects, at the granularity of individual deployments. This form of moving-target defense disrupts batch compromise of devices, preventing reusable network exploits. Our approach identifies candidate program data structures and functions via a set of heuristics, mutate them via static transformations, and selects correctness-preserving mutations using dynamic testing.

Evaluation on 4 popular protocols shows that we mitigate known exploitable vulnerabilities, while introducing no bugs.

Keywords
Software diversity Protocol mutations MTD
Published
2023-02-04
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-25538-0_40
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL