首页> 外文会议>2019 Global IoT Summit >Assessment of Buffer Overflow Based Attacks On an IoT Operating System
【24h】

Assessment of Buffer Overflow Based Attacks On an IoT Operating System

机译:评估基于IoT操作系统的基于缓冲区溢出的攻击

获取原文
获取原文并翻译 | 示例

摘要

The vulnerability of electronic systems to attacks from hostile agents over the Internet is a matter of growing concern as the digital world becomes increasingly interconnected. Many countermeasures have been put in place to address these concerns, but the computational burden they impose may be excessive for low-power devices. In particular, the devices which comprise The Internet of Things are particularly vulnerable. This paper provides numerical assessments of their vulnerability to a class of attacks based on triggering buffer overflows. We focus on two such attacks, namely return-to-lib-c and code injection, for IoT devices using the FreeRTOS (V9.0.0) operating system. We show the deficiencies of the prevention measures provided in FreeRTOS to prevent these kinds of attacks, and compare them to the more robust mechanisms available in a mainstream OS (Ubuntu 16.04.1). The paper concludes with suggestions of how to mitigate these vulnerabilities in FreeRTOS - further investigation will be required to determine whether similar vulnerabilities exist in other IoT operating systems.
机译:随着数字世界的日益互联互通,电子系统易受互联网上敌对代理攻击的脆弱性日益引起人们的关注。已经采取了许多对策来解决这些问题,但是它们对低功率设备造成的计算负担可能过大。尤其是,组成物联网的设备特别容易受到攻击。本文提供了基于触发缓冲区溢出的数值评估,以评估其对一类攻击的脆弱性。对于使用FreeRTOS(V9.0.0)操作系统的IoT设备,我们重点研究两种此类攻击,即返回lib-c和代码注入。我们展示了FreeRTOS中提供的预防措施的缺陷,这些缺陷可防止此类攻击,并将它们与主流OS中可用的更强大的机制进行比较(Ubuntu 16.04.1)。本文最后提出了有关如何缓解FreeRTOS中这些漏洞的建议-将需要进行进一步的调查以确定其他IoT操作系统中是否存在类似的漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号