Matches in SemOpenAlex for { <https://semopenalex.org/work/W4387149074> ?p ?o ?g. }
Showing items 1 to 73 of
73
with 100 items per page.
- W4387149074 abstract "Trusted Execution Environments (TEEs) embedded in IoT devices provide a deployable solution to secure IoT applications at the hardware level. By design, in TEEs, the Trusted Operating System (Trusted OS) is the primary component. It enables the TEE to use security-based design techniques, such as data encryption and identity authentication. Once a Trusted OS has been exploited, the TEE can no longer ensure security. However, Trusted OSes for IoT devices have received little security analysis, which is challenging from several perspectives: (1) Trusted OSes are closed-source and have an unfavorable environment for sending test cases and collecting feedback. (2) Trusted OSes have complex data structures and require a stateful workflow, which limits existing vulnerability detection tools. To address the challenges, we present SyzTrust, the first state-aware fuzzing framework for vetting the security of resource-limited Trusted OSes. SyzTrust adopts a hardware-assisted framework to enable fuzzing Trusted OSes directly on IoT devices as well as tracking state and code coverage non-invasively. SyzTrust utilizes composite feedback to guide the fuzzer to effectively explore more states as well as to increase the code coverage. We evaluate SyzTrust on Trusted OSes from three major vendors: Samsung, Tsinglink Cloud, and Ali Cloud. These systems run on Cortex M23/33 MCUs, which provide the necessary abstraction for embedded TEEs. We discovered 70 previously unknown vulnerabilities in their Trusted OSes, receiving 10 new CVEs so far. Furthermore, compared to the baseline, SyzTrust has demonstrated significant improvements, including 66% higher code coverage, 651% higher state coverage, and 31% improved vulnerability-finding capability. We report all discovered new vulnerabilities to vendors and open source SyzTrust." @default.
- W4387149074 created "2023-09-29" @default.
- W4387149074 creator A5031848612 @default.
- W4387149074 creator A5033073212 @default.
- W4387149074 creator A5043763521 @default.
- W4387149074 creator A5047459900 @default.
- W4387149074 creator A5057290993 @default.
- W4387149074 creator A5058276289 @default.
- W4387149074 creator A5058611515 @default.
- W4387149074 creator A5062687402 @default.
- W4387149074 creator A5065116578 @default.
- W4387149074 creator A5067065591 @default.
- W4387149074 creator A5071457448 @default.
- W4387149074 date "2023-09-26" @default.
- W4387149074 modified "2023-10-18" @default.
- W4387149074 title "SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices" @default.
- W4387149074 doi "https://doi.org/10.48550/arxiv.2309.14742" @default.
- W4387149074 hasPublicationYear "2023" @default.
- W4387149074 type Work @default.
- W4387149074 citedByCount "0" @default.
- W4387149074 crossrefType "posted-content" @default.
- W4387149074 hasAuthorship W4387149074A5031848612 @default.
- W4387149074 hasAuthorship W4387149074A5033073212 @default.
- W4387149074 hasAuthorship W4387149074A5043763521 @default.
- W4387149074 hasAuthorship W4387149074A5047459900 @default.
- W4387149074 hasAuthorship W4387149074A5057290993 @default.
- W4387149074 hasAuthorship W4387149074A5058276289 @default.
- W4387149074 hasAuthorship W4387149074A5058611515 @default.
- W4387149074 hasAuthorship W4387149074A5062687402 @default.
- W4387149074 hasAuthorship W4387149074A5065116578 @default.
- W4387149074 hasAuthorship W4387149074A5067065591 @default.
- W4387149074 hasAuthorship W4387149074A5071457448 @default.
- W4387149074 hasBestOaLocation W43871490741 @default.
- W4387149074 hasConcept C111065885 @default.
- W4387149074 hasConcept C111919701 @default.
- W4387149074 hasConcept C11413529 @default.
- W4387149074 hasConcept C148730421 @default.
- W4387149074 hasConcept C149635348 @default.
- W4387149074 hasConcept C202775310 @default.
- W4387149074 hasConcept C2776831232 @default.
- W4387149074 hasConcept C2777904410 @default.
- W4387149074 hasConcept C38652104 @default.
- W4387149074 hasConcept C41008148 @default.
- W4387149074 hasConcept C48103436 @default.
- W4387149074 hasConcept C527821871 @default.
- W4387149074 hasConceptScore W4387149074C111065885 @default.
- W4387149074 hasConceptScore W4387149074C111919701 @default.
- W4387149074 hasConceptScore W4387149074C11413529 @default.
- W4387149074 hasConceptScore W4387149074C148730421 @default.
- W4387149074 hasConceptScore W4387149074C149635348 @default.
- W4387149074 hasConceptScore W4387149074C202775310 @default.
- W4387149074 hasConceptScore W4387149074C2776831232 @default.
- W4387149074 hasConceptScore W4387149074C2777904410 @default.
- W4387149074 hasConceptScore W4387149074C38652104 @default.
- W4387149074 hasConceptScore W4387149074C41008148 @default.
- W4387149074 hasConceptScore W4387149074C48103436 @default.
- W4387149074 hasConceptScore W4387149074C527821871 @default.
- W4387149074 hasLocation W43871490741 @default.
- W4387149074 hasOpenAccess W4387149074 @default.
- W4387149074 hasPrimaryLocation W43871490741 @default.
- W4387149074 hasRelatedWork W1973244388 @default.
- W4387149074 hasRelatedWork W1978013222 @default.
- W4387149074 hasRelatedWork W2129893877 @default.
- W4387149074 hasRelatedWork W2350805447 @default.
- W4387149074 hasRelatedWork W2377502241 @default.
- W4387149074 hasRelatedWork W2387334916 @default.
- W4387149074 hasRelatedWork W2387926039 @default.
- W4387149074 hasRelatedWork W2391072174 @default.
- W4387149074 hasRelatedWork W2393761997 @default.
- W4387149074 hasRelatedWork W2771025373 @default.
- W4387149074 isParatext "false" @default.
- W4387149074 isRetracted "false" @default.
- W4387149074 workType "article" @default.