The seamless security approach for embedded systems
Connected devices can’t run bolt-on cybersecurity products such as anti-virus or EDR tools. To enable them to be protected from cyberattacks, connected devices must embed cybersecurity capabilities in their software. Such measures enable the devices to be deterministically self-protected against attacks, without relying on frequent updates or connectivity.
Seamless to Developers
Karamba’s runtime integrity software is seamlessly integrated with the device’s development lifecycle, without changing development processes or interfering with developers. In runtime Karamba’s software performs continuous integrity checks, enabling the device to be-self protected against deviations from the device’s factory settings assuring software integrity.
Connected devices are often constrained by limited resources, such as CPU power and memory size. In addition, connectivity may also face performance limitations in terms of bandwidth, availability, and costs. Karamba’s patented embedded security agents were designed and implemented with low CPU and memory size of ~5%, ~10% image size and no impact on network overhead.
How to Achieve Self Protection
By integrating Karamba’s tools to the device’s development toolchain, product security teams implement deterministic product security measures with no impact on R&D processes, development timelines, or architectures.
Karamba XGuard platform automatically scans binaries and creates a factory-settings baseline which reflects legitimate binaries, messages and functions calls of the device’s software. Changes from that automatically-created model indicate an exploit attempt, i.e. a cyberattack.
In-memory attacks leverage memory corruption vulnerability to perform remote code execution and other code reuse attacks. XGuard Control Flow Integrity deterministically detects illegitimate memory utilizations of the fileless attacks and can block and report the events. Karamba’s patented CFI has a negligible, 5%, impact on CPU performance and memory usage, applicable to embedded environments.
In dropper attacks, a self-contained malicious program, library, or script is added to the device and triggered to execute during runtime. Dropper attacks commonly following other exploitations, in order to execute the actual malicious behavior, or to establish a command and control channel.
Applying whitelisting is a strong protection against file traversal and other exploits but it is typically difficult to manually implement and maintain. XGuard Whitelisting automatically creates binary whitelists during the image build process, without developer intervention and without any need to change version release plans.
Critical commands over the network need to be authenticated and doing so with zero network overhead is the unique approach of SafeCAN. Saturated CAN networks can’t handle additional security requirements and with SafeCAN, the critical use cases of safety and mission critical messages are protected with negligible performance impact on the ECUs involved.
See Why Our Security Solutions Win Awards
What is autonomous security and how does it provide superior runtime integrity protection? In this white paper, we explain how deterministic methods harden the runtime environment to prevent system hacking.
Runtime Integrity at a Glance
How does Karamba prevent hacking attempts? See a diagram of connected systems cybersecurity. Learn how Karamba eliminates the risks of false positives, performance drag, and security gaps.
XGuard is OS agnostic and compatible with a wide range of platforms out-of-the-box. XGuard can also easily extend its coverage to your platform. Download the paper to read more.
Want to learn more?Contact Us
41000 Woodward Ave
Building East, Suite 350
Bloomfield Hills, MI 48304
Tel: +1 248-574-5171
24 HaNagar Street
Tel: +972 9 88 66 113
Landstr. 264, Munich
Tel: +49 151 1471 6088