DocumentCode :
3588402
Title :
Analysis of OpenSSL Heartbleed vulnerability for embedded systems
Author :
Ghafoor, Imran ; Jattala, Imran ; Durrani, Shakeel ; Muhammad Tahir, Ch
Author_Institution :
Nat. Univ. of Sci. & Technol. (NUST), Islamabad, Pakistan
fYear :
2014
Firstpage :
314
Lastpage :
319
Abstract :
The attack of `Stuxnet´ computer warm on the Iranian nuclear program highlighted the need of cybersecurity for critical infrastructure and embedded systems. The evolution of embedded systems to Internet-of-Things (IoT), where every device from a light-bulb to a medical implant device will be connected over internet. This connected world scenario requires secure communication channels to ensure information-security. OpenSSL is a defacto standard for secure communication over the internet. The memory bound check failure vulnerability CEV-2014-0160 was discovered in OpenSSL on 07th Feb 2014. The vulnerability is commonly known as Heartbleed bug that caused vulnerability in more than 16% of the total webservers. The Heartbleed bug can cause a leakage of 64K memory bytes of memory in plaintext that may contain security keys, X.509 certificates and user´s private data. OpenSSL is also used to secure connected embedded devices. The Heartbleed vulnerability has greater impact on embedded systems/IoT because the few KBs or MBs memory of embedded device can be leaked in few seconds during a well-crafted Heartbleed attack. This research demonstrates a Heartbleed attack, and develops a patch for Heartbleed vulnerability. This research proposes an update to RFC-6520 that can be used as Heartbleed patch for embedded systems. The Memory utilization analysis of the developed Heartbleed patch, new proposed Heartbleed patch & unpatched OpenSSL code for STM32 Cortex-M4 microcontroller.
Keywords :
Internet of Things; embedded systems; microcontrollers; security of data; Heartbleed bug; Internet-of-Things; IoT; Iranian nuclear program; OpenSSL Heartbleed vulnerability; STM32 Cortex-M4 microcontroller; Stuxnet computer attack; cybersecurity; embedded system; information security; memory bound check failure vulnerability; memory utilization analysis; Biomedical monitoring; Google; Heart beat; Microcontrollers; Monitoring; Payloads; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multi-Topic Conference (INMIC), 2014 IEEE 17th International
Print_ISBN :
978-1-4799-5754-5
Type :
conf
DOI :
10.1109/INMIC.2014.7097358
Filename :
7097358
Link To Document :
بازگشت