TY - GEN
T1 - FMC-CEE
T2 - 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2024
AU - Zhang, Zheng
AU - Xue, Jingfeng
AU - Baker, Thar
AU - Chen, Tian
AU - Zhao, Yuhang
AU - Meng, Weizhi
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Applications running on an Internet of Things (IoT) device are usually deployed in an untrusted environment. This introduces risks of vulnerability to malware, and loss of intellectual property associated with security sensitive code. Trusted execution environments (TEEs) and TEE-based applications have been widely adopted to run security sensitive workloads and protect the security of applications. However, existing approaches require specialized CPU support or hardware peripherals equipped with co-processors, precluding widely deployment on low-cost IoT devices. In this paper, we propose a flash memory controller-based collaborative execution environment (FMC-CEE), a lightweight security solution constructed on the target flash device to provide code confidentiality and basic security primitives for low-cost IoT devices and embedded devices. FMC-CEE leverages the microprocessor of the target flash device as a co-processor that executes security-sensitive workloads collaboratively with the target system. We implemented a prototype of FMC-CEE on a Trans-Flash (TF) card and executed security-sensitive tasks of the target host. The experimental results show that FMC-CEE takes 590.748 μs to execute the remote code (512 bytes), thus incurring very little overhead on the host system.
AB - Applications running on an Internet of Things (IoT) device are usually deployed in an untrusted environment. This introduces risks of vulnerability to malware, and loss of intellectual property associated with security sensitive code. Trusted execution environments (TEEs) and TEE-based applications have been widely adopted to run security sensitive workloads and protect the security of applications. However, existing approaches require specialized CPU support or hardware peripherals equipped with co-processors, precluding widely deployment on low-cost IoT devices. In this paper, we propose a flash memory controller-based collaborative execution environment (FMC-CEE), a lightweight security solution constructed on the target flash device to provide code confidentiality and basic security primitives for low-cost IoT devices and embedded devices. FMC-CEE leverages the microprocessor of the target flash device as a co-processor that executes security-sensitive workloads collaboratively with the target system. We implemented a prototype of FMC-CEE on a Trans-Flash (TF) card and executed security-sensitive tasks of the target host. The experimental results show that FMC-CEE takes 590.748 μs to execute the remote code (512 bytes), thus incurring very little overhead on the host system.
KW - Collaborative execution environment
KW - Flash memory controller
KW - IoT security
KW - Software reverse engineering
UR - http://www.scopus.com/inward/record.url?scp=85192500849&partnerID=8YFLogxK
U2 - 10.1109/PerComWorkshops59983.2024.10502685
DO - 10.1109/PerComWorkshops59983.2024.10502685
M3 - Conference contribution
AN - SCOPUS:85192500849
T3 - 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2024
SP - 88
EP - 93
BT - 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2024
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 11 March 2024 through 15 March 2024
ER -