Design and implementation of the secure compiler and virtual machine for developing secure IoT services

Yang Sun Lee, Junho Jeong, Yunsik Son

Research output: Contribution to journalArticlepeer-review

39 Scopus citations

Abstract

Recent years have seen the development of computing environments for IoT (Internet of Things) services, which exchange large amounts of information using various heterogeneous devices that are always connected to networks. Since the data communication and services occur on a variety of devices, which not only include traditional computing environments and mobile devices such as smartphones, but also household appliances, embedded devices, and sensor nodes, the security requirements are becoming increasingly important at this point in time. Already, in the case of mobile applications, security has emerged as a new issue, as the dissemination and use of mobile applications have been rapidly expanding. This software, including IoT services and mobile applications, is continuously exposed to malicious attacks by hackers, because it exchanges data in the open Internet environment. The security weaknesses of this software are the direct cause of software breaches causing serious economic loss. In recent years, the awareness that developing secure software is intrinsically the most effective way to eliminate the software vulnerability, rather than strengthening the security system of the external environment, has increased. Therefore, methodology based on the use of secure coding rules and checking tools is attracting attention to prevent software breaches in the coding stage to eliminate the above vulnerabilities. This paper proposes a compiler and a virtual machine with secure software concepts for developing secure and trustworthy services for IoT environments. By using a compiler and virtual machine, we approach the problem in two stages: a prevention stage, in which the secure compiler removes the security weaknesses from the source code during the application development phase, and a monitoring stage, in which the secure virtual machine monitors abnormal behavior such as buffer overflow attacks or untrusted input data handling while applications are running.

Original languageEnglish
Pages (from-to)350-357
Number of pages8
JournalFuture Generation Computer Systems
Volume76
DOIs
StatePublished - Nov 2017

Keywords

  • Compiler construction
  • IoT services
  • Program analysis
  • S/W weakness
  • Secure software
  • Virtual machine

Fingerprint

Dive into the research topics of 'Design and implementation of the secure compiler and virtual machine for developing secure IoT services'. Together they form a unique fingerprint.

Cite this