首页> 外文会议>Computer Security Applications Conference >Defending Embedded Systems Against Buffer Overflow via Hardware/Software
【24h】

Defending Embedded Systems Against Buffer Overflow via Hardware/Software

机译:通过硬件/软件防御缓冲区溢出的嵌入式系统

获取原文

摘要

Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded systems against buffer overflow attacks. In this paper, we propose the Hardware/Software Address Protection (HSAP) technique to solve this problem. We first classify buffer overflow attacks into two categories (stack smashing attacks and function pointer attacks) and then provide two corresponding defending strategies. In our technique, hardware boundary check method and function pointer XOR method are used to protect a system against stack smashing attacks and function pointer attacks, respectively. Although the focus of the HSAP technique is on embedded systems because of the availability of hardware support, we show that the HSAP technique can be applied to any type of processors to defend against buffer overflow attacks. We use four classes of processors to illustrate that the applicability of our technique is independent of architectures. We experiment with our HSAP technique in ARM Evaluator-7T simulation development environments. The results show that our HSAP technique can defend a system against more types of buffer overflow attacks with little overhead than the previous work.
机译:缓冲区溢出攻击几十年来造成严重的安全问题。通过更多嵌入式系统网络,它成为防御缓冲区溢出攻击的嵌入式系统的重要研究问题。在本文中,我们提出了解决这个问题的硬件/软件地址保护(HSAP)技术。我们首先将缓冲区溢出攻击分为两类(堆栈粉碎攻击和函数指针攻击),然后提供两个相应的防御策略。在我们的技术中,硬件边界检查方法和功能指针XOR方法分别用于保护系统免受堆栈粉碎攻击和功能指针攻击。尽管HSAP技术的重点是由于硬件支持的可用性而在嵌入式系统上,但我们表明HSAP技术可以应用于任何类型的处理器来防御缓冲区溢出攻击。我们使用四类处理器来说明我们技术的适用性与架构无关。我们在ARM评估器-7T仿真开发环境中进行了我们的HSAP技术。结果表明,我们的HSAP技术可以防御系统的溢出溢出的系统,而不是比以前的工作略微开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号