【24h】

Code Injection Attacks on Harvard-Architecture Devices

机译:哈佛架构设备上的代码注射攻击

获取原文

摘要

Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited memory and can process only very small packets. Stack-based buffer overflow techniques that inject code into the stack and then execute it are therefore not applicable. It has been a common belief that code injection is impossible on Harvard architectures. This paper presents a remote code injection attack for Mica sensors. We show how to exploit program vulnerabilities to permanently inject any piece of code into the program memory of an Atmel AVR-based sensor. To our knowledge, this is the first result that presents a code injection technique for such devices. Previous work only succeeded in injecting data or performing transient attacks. Injecting permanent code is more powerful since the attacker can gain full control of the target sensor. We also show that this attack can be used to inject a worm that can propagate through the wireless sensor network and possibly create a sensor botnet. Our attack combines different techniques such as return oriented programming and fake stack injection. We present implementation details and suggest some counter-measures.
机译:哈佛架构CPU设计在嵌入式世界中很常见。哈佛架构设备的示例是云母系列无线传感器。 MICA MOTES内存有限,只能处理非常小的数据包。因此,基于堆栈的缓冲区溢出技术将代码注入堆栈,然后执行它是不适用的。在哈佛架构上不可能是一种常见的信念。本文为云母传感器提供了远程代码注入攻击。我们展示了如何利用程序漏洞将任何代码永久注入到基于ATMEL AVR的传感器的程序存储器中。据我们所知,这是为这种设备提供代码注入技术的第一个结果。以前的工作只成功地注入数据​​或执行瞬态攻击。注入永久代码更强大,因为攻击者可以完全控制目标传感器。我们还表明,该攻击可用于注入可以通过无线传感器网络传播的蠕虫,并可能创建传感器僵尸网络。我们的攻击结合了不同的技术,如返回面向的编程和假堆叠注射。我们提出了实施细节并提出了一些反措施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号