Overview
Syllabus
Intro
The unverifiable (blind) trust
Existing solutions -- attestation
Example: vulnerable robotic arm
Our Solution
OEI (Operation Exec. Integrity)
OEI: two sub-properties
Attestation Challenges
OAT (OEI Attestation Framework)
Threat model
Operations
CFI Attestation
Intuitive measurement schemes
A hybrid scheme
Measurement Collection & Verification
Critical variable identification
Existing data integrity checks
Def-Use Value Integrity (DVI)
Implementation notes
Tests on real embedded firmware
Micro Performance Tests
Comparisons
Security Tests & Analysis
Conclusion
Taught by
IEEE Symposium on Security and Privacy