• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Scopus
  4. BT2X: Multi-Leveled Binary Transparency to Protect the Software Supply Chain of Operational Technology
 
  • Details
  • Full
Options
November 22, 2024
Conference Paper
Title

BT2X: Multi-Leveled Binary Transparency to Protect the Software Supply Chain of Operational Technology

Abstract
An increasing number of attacks targeting software supply chains poses a significant threat to software-reliant systems such as Operational Technology (OT). One noteworthy variant of software supply chain attacks is the circumvention of code signing by utilizing stolen signing keys. Binary Transparency (BT) serves as a mechanism to detect and deter such attacks by mandating that every signed binary is stored in a trusted append-only log. We introduce BT-To-The-X (BT2X) which brings BT to OT. To support retrofitting of computationally less capable devices, BT2X introduces well-defined audit levels and assisting infrastructure. Furthermore, it includes a federated gossiping protocol to detect misbehaving logs presenting inconsistent views to different observers. We implemented BT2X on low-power microcontrollers using Rust and evaluated it with regard to size and performance to demonstrate its practical feasibility.
Author(s)
Heinl, Michael P.  orcid-logo
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Embacher, Victor Christian
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Mainwork
CPSIoTSec 2024, Sixth Workshop on CPS&IoT Security and Privacy. Proceedings  
Conference
Workshop on CPS&IoT Security and Privacy 2024  
Conference on Computer and Communications Security 2024  
Open Access
File(s)
Download (1.19 MB)
Rights
CC BY 4.0: Creative Commons Attribution
DOI
10.1145/3690134.3694816
10.24406/publica-5395
Additional link
Full text
Language
English
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Keyword(s)
  • code signing

  • constrained devices

  • defense-in-depth

  • iec 62443

  • software supply chain security

  • software transparency

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024