SWATT
SWATT: software-based attestation for embedded devices. We expect a future where we are surrounded by embedded devices, ranging from Java-enabled cell phones to sensor networks and smart appliances. An adversary can compromise our privacy and safety by maliciously modifying the memory contents of these embedded devices. In this paper, we propose a softWare-based attestation technique (SWATT) to verify the memory contents of embedded devices and establish the absence of malicious changes to the memory contents. SWATT does not need physical access to the device’s memory, yet provides memory content attestation similar to TCG or NGSCB without requiring secure hardware. SWATT can detect any change in memory contents with high probability, thus detecting viruses, unexpected configuration settings, and Trojan Horses. To circumvent SWATT, we expect that an attacker needs to change the hardware to hide memory content changes. We present an implementation of SWATT in off-the-shelf sensor network devices, which enables us to verify the contents of the program memory even while the sensor node is running.
Keywords for this software
References in zbMATH (referenced in 5 articles )
Showing results 1 to 5 of 5.
Sorted by year (- Boldyreva, Alexandra; Kim, Taesoo; Lipton, Richard; Warinschi, Bogdan: Provably-secure remote memory attestation for heap overflow protection (2016)
- Tang, Shaohua; Lv, Bo; Shen, Wuqiang: Hybrid MQ signature for embedded device (2016)
- Chen, Ing-Ray; Wang, Yating; Wang, Ding-Chau: Reliability of wireless sensors with code attestation for intrusion detection (2010)
- Ceccato, Mariano; Preda, Mila Dalla; Nagra, Jasvir; Collberg, Christian; Tonella, Paolo: Trading-off security and performance in barrier slicing for remote software entrusting (2009) ioport
- Pitcher, Corin; Riely, James: Dynamic policy discovery with remote attestation. (Extended abstract) (2006)