MIT Libraries logoDSpace@MIT

MIT
View Item 
  • DSpace@MIT Home
  • MIT Open Access Articles
  • MIT Open Access Articles
  • View Item
  • DSpace@MIT Home
  • MIT Open Access Articles
  • MIT Open Access Articles
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

SoK: Enabling Security Analyses of Embedded Systems via Rehosting

Author(s)
Fasano, Andrew; Ballo, Tiemoko; Muench, Marius; Leek, Tim; Bulekov, Alexander; Dolan-Gavitt, Brendan; Egele, Manuel; Francillon, Aurelien; Lu, Long; Gregory, Nick; Balzarotti, Davide; Robertson, William; ... Show more Show less
Thumbnail
Downloadasiafp242-fasanoA-CC-BY.pdf (978.3Kb)
Publisher with Creative Commons License

Publisher with Creative Commons License

Creative Commons Attribution

Terms of use
Creative Commons Attribution 4.0 International license https://creativecommons.org/licenses/by/4.0/
Metadata
Show full item record
Abstract
Closely monitoring the behavior of a software system during its execution enables developers and analysts to observe, and ultimately understand, how it works. This kind of dynamic analysis can be instrumental to reverse engineering, vulnerability discovery, exploit development, and debugging. While these analyses are typically well supported for homogeneous desktop platforms (e.g., x86 desktopPCs), they can rarely be applied in the heterogeneous world of embedded systems. One approach to enable dynamic analyses of embedded systems is to move software stacks from physical systems into virtual environments that sufficiently model hardware behavior. This process which we call “rehosting” poses a significant research challenge with major implications for security analyses. Although rehosting has traditionally been an unscientific and ad-hoc endeavor undertaken by domain experts with varying time and resources at their disposal, researchers are beginning to address rehosting challenges systematically and in earnest. In this paper, we establish that emulation is insufficient to conduct large-scale dynamic analysis of real-world hardware systems and present rehosting as a firmware centric alternative. Furthermore, we taxonomize preliminary rehosting efforts, identify the fundamental components of the rehosting process, and propose directions for future research.
Date issued
2021-06
URI
https://hdl.handle.net/1721.1/130505
Department
Lincoln Laboratory
Journal
16th ACM ASIA Conference on Computer and Communications Security
Publisher
Association for Computing Machinery (ACM)
Citation
Fasano, Andrew et al. "SoK: Enabling Security Analyses of Embedded Systems via Rehosting." Forthcoming in 16th ACM ASIA Conference on Computer and Communications Security (June 2021).
Version: Final published version

Collections
  • MIT Open Access Articles

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

Login

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries
PrivacyPermissionsAccessibilityContact us
MIT
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.