Reference 1
IoT devices are mostly single-purpose running a dedicated, single application. As a result, vulnerabilities in third party libraries within a process pose a much bigger threat than on traditional platforms.
Pyronia: protects against untrusted third-party code with unmodified source code.
Goals:
Design:
function level access rules: developer specifies access rules of which third-party functions can access which private data;
good: developer does not need to reason about third-party code (e.g. to track the data flow);
3 Techniques:
Evaluation:
==> LLM: not a regular IoT, but a ‘high performance’ IoT device.
If you could revise
the fundmental principles of
computer system design
to improve security...
... what would you change?