Has My IoT Device Been Hacked? Establishing Trust w/ Remote Attestation • Edlira Dushku • GOTO 2023

Discover how to establish trust with remote attestation in IoT devices, overcoming vulnerabilities, code injection attacks, and adversaries' exploits, and learn about emerging solutions for secure authentication and confidential computing.

Key takeaways
  • IoT devices are highly susceptible to exploitation due to their poor security features and lack of standards.
  • IoT devices are often exposed to asynchronous attacks and can be compromised by even basic adversaries.
  • Attestation is a means to establish trust in an IoT device’s software, preventing code injection attacks.
  • Traditional software-based attestation protocols are insecure and can be easily exploited by advanced adversaries.
  • New approaches like hybrid, swarm, and control flow attestation aim to enhance remote attestation for IoT devices.
  • Zero-knowledge proof can be used for secure authentication without revealing sensitive information.
  • Confusion and noise in IoT data transmission can make it difficult to establish trust in an IoT device.
  • Even minor devices can be compromised by an adversary, and malware detection can be a significant challenge.
  • IoT devices’ physical proximity to attackers or adversaries can make attestation a complex task.
  • Existing standards, such as TPM, for IoT security are limited and may require upgrading to suit IoT devices.
  • Some solutions, like Intel SGX, aim to establish confidential computing for IoT devices to improve security.
  • Attestation’s main goal is to guarantee that an IoT device is executing authorized code, preventing runtime attacks.