JOURNAL ARTICLE

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

Abstract

Memory corruption vulnerabilities have been around for decades and rank among the most prevalent vulnerabilities in embedded systems. Yet this constrained environment poses unique design and implementation challenges that significantly complicate the adoption of common hardening techniques. Combined with the irregular and involved nature of embedded patch management, this results in prolonged vulnerability exposure windows and vulnerabilities that are relatively easy to exploit. Considering the sensitive and critical nature of many embedded systems, this situation merits significant improvement. In this work, we present the first quantitative study of exploit mitigation adoption in 42 embedded operating systems, showing the embedded world to significantly lag behind the general-purpose world. To improve the security of deeply embedded systems, we subsequently present μArmor, an approach to address some of the key gaps identified in our quantitative analysis. μArmor raises the bar for exploitation of embedded memory corruption vulnerabilities, while being adoptable on the short term without incurring prohibitive extra performance or storage costs.

Keywords:
Exploit Computer science Computer security Vulnerability (computing) Vulnerability management Embedded system Risk analysis (engineering) Vulnerability assessment Business

Metrics

41
Cited By
2.77
FWCI (Field Weighted Citation Impact)
37
Refs
0.92
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Diamond and Carbon-based Materials Research
Physical Sciences →  Materials Science →  Materials Chemistry
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Challenges and opportunities in deeply embedded systems security

Madhukar AnandInsup Lee

Journal:   ACM SIGBED Review Year: 2008 Vol: 5 (1)Pages: 1-2
JOURNAL ARTICLE

Profiling in deeply embedded systems

Erkki MooritsGert Jervan

Year: 2012 Pages: 127-130
JOURNAL ARTICLE

Towards verifiable deeply embedded systems

Terry TidwellChristopher Gill

Journal:   ACM SIGBED Review Year: 2008 Vol: 5 (1)Pages: 1-2
BOOK-CHAPTER

Towards Automated Exploit Generation for Embedded Systems

Matthew RuffellJin B. HongHyoungshick KimDong Seong Kim

Lecture notes in computer science Year: 2017 Pages: 161-173
© 2026 ScienceGate Book Chapters — All rights reserved.