Firmware refers to device read-only resident code which includes microcode and macro-instruction -level routines. For Internet-of-Things (IoT) devices without an operating system, firmware includes all the necessary instructions on how such embedded systems operate and communicate. Thus, firmware updates are an essential part of device functionality. They provide the ability to patch vulnerabilities, address operational issues, and improve device reliability and performance during the lifetime of the system. This process, however, is often exploited by attackers in order to inject malicious firmware code into the embedded device. In this paper, we present a framework for secure firmware updates on embedded systems. The approach is based on hardware primitives and cryptographic modules, and it can be deployed in environments where communication channels might be insecure. The implementation of the framework is flexible as it can be adapted in regards to the IoT device's available hardware resources and constraints. Our security analysis shows that our framework is resilient to a variety of attack vectors. The experimental setup demonstrates the feasibility of the approach. By implementing a variety of test cases on FPGA, we demonstrate the adaptability and performance of the framework. Experiments indicate that the update procedure for a 1183kB firmware image could be achieved, in a secure manner, under 1.73 seconds.
翻译:硬体软件指设备只读的常住代码, 包括微码和宏观指令- 级常规。 对于没有操作系统的互联网操作设备, 硬体软件包含关于这些嵌入系统如何运行和通信的所有必要指示。 因此, 硬体软件更新是设备功能的一个基本部分。 固体软件更新提供了弥补弱点、 处理操作问题、 提高设备可靠性和系统寿命期内性能的能力。 但是, 这一过程经常被攻击者利用, 以便向嵌入的设备输入恶意的硬体代码。 本文中, 我们提出了一个嵌入系统的安全固态更新框架。 这种方法以硬件原始和加密模块为基础, 可以在通信渠道可能不安全的环境中部署。 框架的实施是灵活的, 因为它可以适应IOT设备现有的硬件资源和限制。 我们的安全分析表明, 我们的框架能够适应各种攻击矢量。 实验设置显示该方法的可行性。 通过在嵌入系统上执行各种测试案例, 我们演示了1183 软体框架的适应性和性操作方式。 在11. 83 实验中, 我们演示了一种安全软件的更新程序。