How Memory-Safe is IoT? Assessing the Impact of Memory-Protection Solutions for Securing Wireless Gateways (2411.01377v1)
Abstract: The rapid development of the Internet of Things (IoT) has enabled novel user-centred applications, including many in safety-critical areas such as healthcare, smart environment security, and emergency response systems. The diversity in IoT manufacturers, standards, and devices creates a combinatorial explosion of such deployment scenarios, leading to increased security and safety threats due to the difficulty of managing such heterogeneity. In almost every IoT deployment, wireless gateways are crucial for interconnecting IoT devices and providing services, yet they are vulnerable to external threats and serve as key entry points for large-scale IoT attacks. Memory-based vulnerabilities are among the most serious threats in software, with no universal solution yet available. Legacy memory protection mechanisms, such as canaries, RELRO, NX, and Fortify, have enhanced memory safety but remain insufficient for comprehensive protection. Emerging technologies like ARM-MTE, CHERI, and Rust are based on more universal and robust Secure-by-Design (SbD) memory safety principles, yet each entails different trade-offs in hardware or code modifications. Given the challenges of balancing security levels with associated overheads in IoT systems, this paper explores the impact of memory safety on the IoT domain through an empirical large-scale analysis of memory-related vulnerabilities in modern wireless gateways. Our results show that memory vulnerabilities constitute the majority of IoT gateway threats, underscoring the necessity for SbD solutions, with the choice of memory-protection technology depending on specific use cases and associated overheads.
- Inc. Anchore. 2024. Syft: a CLI tool and library for generating a Software Bill of Materials (SBOM) from container images and filesystems. https://github.com/anchore/syft Accessed: 2024-08-27.
- Arm. 2019. Armv8.5-A Memory Tagging Extension White Paper. https://developer.arm.com/documentation/102925/latest/ Accessed: 2024-09-04.
- Joseph Biden. 2021. Executive Order on Improving the Nation’s Cybersecurity. https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/. Accessed: 2024-06-20.
- Mind The Plug! Laptop-User Recognition Through Power Consumption. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (Xi’an, China) (IoTPTS ’16). Association for Computing Machinery, New York, NY, USA, 37–44. https://doi.org/10.1145/2899007.2899009
- Is Anybody Home? Inferring Activity From Smart Home Network Traffic. In 2016 IEEE Security and Privacy Workshops (SPW). 245–251. https://doi.org/10.1109/SPW.2016.48
- CycloneDX. 2024. CycloneDX: The International Standard for Bill of Materials (ECMA-424). https://cyclonedx.org/. Accessed: 2024-08-28.
- DG CONNECT European Commission. 2023. Cyber Resilience Act. https://www.cisa.gov/sites/default/files/2023-09/EU%20Commission%20SBOM%20Work_508c.pdf Accessed: 2024-08-27.
- Safe by design: where are we now? Safety Science 45, 1 (2007), 305–327. https://doi.org/10.1016/j.ssci.2006.08.007 Safety by Design.
- Generic Bill-of-Materials-and-Operations for High-Variety Production Management. Concurrent Engineering: Research and Applications - Concurrent Engineering: RA 8 (12 2000), 297–321. https://doi.org/10.1177/1063293X0000800404
- Michael Johnson and Patricia Wilson. 2023. Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era. arXiv preprint arXiv:2309.04119 (2023).
- RustBelt: securing the foundations of the Rust programming language. Proc. ACM Program. Lang. 2, POPL, Article 66 (dec 2017), 34Â pages. https://doi.org/10.1145/3158154
- Ashwin Karale. 2021. The Challenges of IoT Addressing Security, Ethics, Privacy, and Laws. Internet of Things 15 (2021), 100420. https://doi.org/10.1016/j.iot.2021.100420
- ReFirm Labs. 2024. Binwalk. https://github.com/ReFirmLabs/binwalk. Accessed: 2024-08-05.
- A comprehensive survey of vulnerability detection method towards Linux-based IoT devices. In Proceedings of the 2023 2nd International Conference on Networks, Communications and Information Technology (Qinghai, China) (CNCIT ’23). Association for Computing Machinery, New York, NY, USA, 35–41. https://doi.org/10.1145/3605801.3605808
- Nicholas D. Matsakis and Felix S. Klock II. 2014. The Rust Language. ACM SIGAda Ada Letters 34, 3 (2014), 103–104. https://doi.org/10.1145/2663171.2663188
- Matt Miller. 2019. Trends, Challenge, and Shifts in Software Vulnerability Mitigation. https://github.com/Microsoft/MSRC-Security-Research/tree/master/presentations/2019_02_BlueHatIL Microsoft Security Response Center.
- MITRE. 2024. Common Weakness Enumeration (CWE). https://cwe.mitre.org/. Accessed: 2024-08-29.
- Microsoft Security Response Center (MSRC). 2020. Security Analysis of Memory Tagging. https://github.com/microsoft/MSRC-Security-Research/blob/daf8d2e203be1047d86ec8c3378c9c8ab2364c29/papers/2020/Security%20analysis%20of%20memory%20tagging.pdf Accessed: 2024-09-26.
- Nquiringminds. 2024. SBOM-GAP. https://github.com/nqminds/SBOM-GAP Accessed: 2024-08-27.
- Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulator. In 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 470–479. https://doi.org/10.1109/DSN58367.2023.00051
- OpenAI. 2024. Hello GPT-4o. https://openai.com/index/hello-gpt-4o/ Accessed: 2024-08-27.
- AddressSanitizer: a fast address sanity checker. In Proceedings of the 2012 USENIX Conference on Annual Technical Conference (Boston, MA) (USENIX ATC’12). USENIX Association, USA, 28.
- Satyajit Sinha. 2024. State of IoT 2024: Number of connected IoT devices growing 13% to 18.8 billion globally. https://iot-analytics.com/number-connected-iot-devices/ Accessed: 2024-09-04.
- John Smith and Jane Doe. 2022. A Comprehensive Survey of Tagged Memory-Protection Techniques. Comput. Surveys 53, 4 (2022), 1–30. https://doi.org/10.1145/3533704
- Dorsaf Swessi and Hanen Idoudi. 2022. A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures. Wirel. Pers. Commun. 124, 2 (may 2022), 1557–1592. https://doi.org/10.1007/s11277-021-09420-0
- Clang Team. 2012. MemorySanitizer: A Detector of Uninitialized Memory Reads. https://clang.llvm.org/docs/MemorySanitizer.html.
- National Telecommunications and Information Administration. 2021. Software Bill of Materials (SBOM). https://www.ntia.gov/page/software-bill-materials Accessed: 2024-08-27.
- The CHERI capability model: revisiting RISC in an age of risk. In Proceeding of the 41st Annual International Symposium on Computer Architecuture (Minneapolis, Minnesota, USA) (ISCA ’14). IEEE Press, 457–468.
- Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, 5627–5644. https://www.usenix.org/conference/usenixsecurity24/presentation/wu-yuhao
- In-fat pointer: hardware-assisted tagged-pointer spatial memory safety defense with subobject granularity protection. In Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (Virtual, USA) (ASPLOS ’21). Association for Computing Machinery, New York, NY, USA, 224–240. https://doi.org/10.1145/3445814.3446761
- Building Embedded Systems Like It’s 1996. arXiv:2203.06834 [cs.CR] https://arxiv.org/abs/2203.06834
- A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware. In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (Virtual, South Korea) (ISSTA 2022). Association for Computing Machinery, New York, NY, USA, 442–454. https://doi.org/10.1145/3533767.3534366
- A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-Party Components in IoT Firmware. In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (Virtual, South Korea) (ISSTA 2022). Association for Computing Machinery, New York, NY, USA, 442–454. https://doi.org/10.1145/3533767.3534366
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.