"We just did not have that on the embedded system": Insights and Challenges for Securing Microcontroller Systems from the Embedded CTF Competitions
Ma, Liu, Eastman et al.
Microcontroller systems are integral to our daily lives, powering mission-critical applications such as vehicles, medical devices, and industrial control systems. Therefore, it is essential to investigate and outline the challenges encountered in developing secure microcontroller systems. While previous research has focused solely on microcontroller firmware analysis to identify and characterize vulnerabilities, our study uniquely leverages data from the 2023 and 2024 MITRE eCTF team submissions and post-competition interviews. This approach allows us to dissect the entire lifecycle of secure microcontroller system development from both technical and perceptual perspectives, providing deeper insights into how these vulnerabilities emerge in the first place.
Through the lens of eCTF, we identify fundamental conceptual and practical challenges in securing microcontroller systems. Conceptually, it is difficult to adapt from a microprocessor system to a microcontroller system, and participants are not wholly aware of the unique attacks against microcontrollers. Practically, security-enhancing tools, such as the memory-safe language Rust, lack adequate support on microcontrollers. Additionally, poor-quality entropy sources weaken cryptography and secret generation. Our findings articulate specific research, developmental, and educational deficiencies, leading to targeted recommendations for researchers, developers, vendors, and educators to enhance the security of microcontroller systems.
academic
"We just did not have that on the embedded system": Insights and Challenges for Securing Microcontroller Systems from the Embedded CTF Competitions
Title: "We just did not have that on the embedded system": Insights and Challenges for Securing Microcontroller Systems from the Embedded CTF Competitions
Authors: Zheyuan Ma, Gaoxiang Liu, Alex Eastman, Kai Kaufman, Md Armanuzzaman, Xi Tan, Katherine Jesse, Robert J. Walls, Ziming Zhao
Classification: cs.CR (Cryptography and Security)
Publication Venue/Conference: ACM SIGSAC Conference on Computer and Communications Security (CCS '25)
Microcontroller systems are indispensable in everyday life, powering critical applications such as vehicles, medical devices, and industrial control systems. This research examines the complete lifecycle of secure microcontroller system development from both technical and cognitive perspectives through analysis of team submissions and post-competition interviews from the 2023 and 2024 MITRE Embedded CTF (eCTF) competitions. The study identifies two major categories of challenges: conceptual challenges, including difficulties in transitioning from microprocessor to microcontroller systems and insufficient awareness of microcontroller-specific attacks; and practical challenges, including inadequate support for memory-safe languages like Rust on microcontrollers and weak entropy sources that compromise cryptographic security and key generation. The research provides targeted recommendations for researchers, developers, vendors, and educators.
Microcontroller (MCU) systems are widely deployed in critical infrastructure, yet their secure development faces unique challenges. Existing research primarily focuses on firmware vulnerability analysis, lacking deep understanding of vulnerability root causes, particularly from developer cognition and practice perspectives.
Methodological Innovation: Proposes a method for studying microcontroller system security challenges through CTF competitions, combining technical analysis with cognitive perspectives to examine the complete development lifecycle
Dual Challenge Classification Framework: Systematically identifies and categorizes conceptual challenges (knowledge gaps) and practical challenges (tool/resource limitations)
Empirical Findings:
Conceptual challenges: Insufficient application of fundamental security mechanisms such as privilege separation, memory erasure, and stack canaries; platform adaptation difficulties; weak awareness of hardware attack defenses
Practical challenges: Inadequate support for memory-safe languages like Rust; lack of high-quality entropy sources
Actionable Recommendations: Provides nine specific recommendations for five stakeholder groups (researchers, vendors, educators, developers, compiler maintainers)
Data Resources: Analysis of 47 team submissions (20 from 2023, 27 from 2024) with 22 in-depth interviews
Dual-Track Methodology: First to combine large-scale code analysis with in-depth interviews, revealing both "what" and "why"
Full Lifecycle Perspective: Trace vulnerability evolution from design documents → source code → binary → developer cognition
Ecosystem Analysis Framework: Identify issues not only attributable to developers but also involving compilers, vendors, education, and other stakeholders
Problem: Widespread use of unsafe blocks to call C SDK functions
Reason: Incremental development model allowing gradual code migration to Rust
Contrast: C18-T08 limited unsafe to low-level hardware interaction layer
Observation 4: Rust users face challenges: no_std compilation, HAL implementation, unsafe management
Observation 5: Automated hardware descriptor transformation to Rust structures can accelerate HAL development, but fidelity and security require further research
Education-Oriented: Vigna et al. (iCTF framework), Vykopal et al. (CTF as teaching tool)
Challenge Analysis: Crispin et al. (Defcon CTF experience), Chung et al. (organization pitfalls)
This Work's Distinction: First to combine submission analysis with interviews, focusing on security development challenges rather than educational effectiveness
BIBIFI Research (Parker et al., Ruef et al., Votipka et al.): Analyze microprocessor system development, finding most vulnerabilities stem from misconceptions rather than mistakes
Rust Adoption Research:
Fulton et al.: High-level developer perspective, identifying learning curve and library support issues
Sharma et al.: Analyze 6000+ embedded Rust projects, revealing insufficient ecosystem support
This Work's Contribution: Focus on microcontroller-specific constraints, combining technical and cognitive perspectives
62 Developer Security Misconceptions (Votipka et al., 2020)
Overall Assessment: This is a high-quality embedded security user research paper that reveals deep challenges in microcontroller system secure development through an innovative dual-track methodology. Its greatest value lies in combining technical analysis with developer cognition, providing actionable paths for improving education, tools, and practice. Despite generalization limitations, consistency between findings and real firmware vulnerability rates enhances conclusion credibility. This research establishes a new research paradigm for the embedded security community, warranting further verification and extension by subsequent work.