Secure software updates: disappointments and new challenges

  • Authors:
  • Anthony Bellissimo;John Burgess;Kevin Fu

  • Affiliations:
  • University of Massachusetts Amherst;University of Massachusetts Amherst;University of Massachusetts Amherst

  • Venue:
  • HOTSEC'06 Proceedings of the 1st USENIX Workshop on Hot Topics in Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.02

Visualization

Abstract

A client can use a content distribution network to securely download software updates. These updates help to patch everyday bugs, plug security vulnerabilities, and secure critical infrastructure. Yet challenges remain for secure content distribution: many deployed software update mechanisms are insecure, and emerging technologies pose further hurdles for deployment. Our analysis of several popular software update mechanisms shows that deployed systems often rely on trusted networks to distribute critical software updates-despite the research progress in secure content distribution. We demonstrate how many deployed systems are susceptible to weak man-in-the-middle attacks. Furthermore, emerging technologies such as mobile devices, sensors, medical devices, and RFID tags present new challenges for secure software updates. Sporadic network connectivity and limited power, computation, and storage require a rethinking of traditional approaches for secure content distribution on embedded devices.