Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded Systems

08/09/2019
by   Wei Zhou, et al.
0

As more and more embedded devices are connected to the Internet, leading to the emergence of Internet-of-Things (IoT), previously less tested (and insecure) devices are exposed to miscreants. To prevent them from being compromised, the memory protection unit (MPU), which is readily available on many devices, has the potential to become a free lunch for the defenders. To our surprise, the MPU is seldom used by real-world products. The reasons are multi-fold. While there are non-technical reasons such as compatibility issues, more importantly, we found that MPU brings virtually no security enhancement at the expense of decreased performance and responsiveness. In this work, we investigate the MPU adoption in major real-time operating systems (RTOSs), in particular, the FreeRTOS, and try to pinpoint the fundamental reasons to explain why MPU is not favored. We hope our findings can inspire new remedial solutions to change the situation. We also review the latest MPU design and provide technical suggestions to build more secure embedded systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/13/2022

D-Box: DMA-enabled Compartmentalization for Embedded Applications

Embedded and Internet-of-Things (IoT) devices have seen an increase in a...
research
11/30/2019

Secure Wireless Internet of Things Communication using Virtual Private Networks

The Internet of Things (IoT) is an exploding market as well as a importa...
research
01/17/2023

PUF for the Commons: Enhancing Embedded Security on the OS Level

Security is essential for the Internet of Things (IoT). Cryptographic op...
research
05/13/2020

Grand Challenges for Embedded Security Research in a Connected World

Protecting embedded security is becoming an increasingly challenging res...
research
03/14/2022

Building Embedded Systems Like It's 1996

Embedded devices are ubiquitous. However, preliminary evidence shows tha...
research
02/15/2023

An Efficient B-tree Implementation for Memory-Constrained Embedded Systems

Embedded devices collect and process significant amounts of data in a va...
research
02/16/2021

Towards an accountable Internet of Things: A call for 'reviewability'

As the IoT becomes increasingly ubiquitous, concerns are being raised ab...

Please sign up or login with your details

Forgot password? Click here to reset