...
首页> 外文期刊>Sustainable Computing >Return-oriented programming on a resource constrained device
【24h】

Return-oriented programming on a resource constrained device

机译:在资源受限设备上取向返回的编程

获取原文
获取原文并翻译 | 示例

摘要

Microcontrollers are found in many everyday devices and will only become more prevalent as the Internet of Things (IoT) and other low power devices gain momentum. As such, it is increasingly important that they are reasonably resilient to known exploitation techniques. Modern enterprise-grade systems with virtually unlimited resources have many options when it comes to implementing state of the art intrusion prevention and detection solutions. These solutions are costly in terms of energy, execution time, circuit board area, and - of - course - money. Sustainable IoT devices and power-constrained embedded systems cannot afford such costs and are forced to make suboptimal security trade-offs. One such trade-off is the design of architectures which prevent execution of injected shell code, yet have allowed Return Oriented Programming (ROP) to emerge as a more reliable way to execute malicious code following attacks. ROP is a method used to take over the execution of a program by causing the return address of a function to be modified through an exploit vector, then returning to small segments of otherwise innocuous code located in executable memory one after the other to carry out the attacker's aims. It will be shown that the Tiva TM4C123GH6PM microcontroller, which utilizes a Cortex-M4F processor, can be fully controlled with this technique. Sufficient code is pre-loaded into a ROM on Tiva microcontrollers to erase and rewrite the flash memory where the program resides. Then, that same ROM is searched for a Turing-complete gadget set which would allow for arbitrary execution. This allows an attacker to re-purpose the microcontroller, altering the original functionality to their own malicious ends. Our results show that advanced exploitation techniques are still effective against embedded systems which prioritize energy-efficiency and that more research needs to be focused on finding the right balance of security for devices with a small energy footprint. (C) 2018 Elsevier Inc. All rights reserved.
机译:在许多日常设备中找到微控制器,并且只有事物互联网(物联网)和其他低功耗设备的势头将变得更加普遍。因此,越来越重要的是,它们与已知的开发技术合理地适应。现代企业级系统具有几乎无限的资源,在实现最新的入侵防御和检测解决方案方面存在许多选择。这些解决方案在能量,执行时间,电路板面积和课程中的昂贵昂贵。可持续的物联网设备和功耗约束嵌入式系统不能承担这样的成本,并被强制削弱次优安全措施。一个这样的权衡是架构的设计,防止注入的shell代码执行,但允许返回面向返回的编程(ROP)作为更可靠的方式来执行攻击后执行恶意代码。 ROP是一种方法,用于通过导致通过利用矢量修改函数的返回地址来接管程序的方法,然后返回到另一个在可执行存储器中的小块的小段之后,另一个将执行攻击者的目标。将显示,使用Cortex-M4F处理器的TiVA TM4C123GH6PM微控制器可以通过这种技术完全控制。足够的代码在Tiva微控制器上预加载到ROM中以擦除并重写程序所在的闪存。然后,搜索该相同的ROM,以允许任意执行的图灵完整的小工具集。这允许攻击者重新用途微控制器,将原始功能改为自己的恶意结束。我们的研究结果表明,先进的开发技术对嵌入式系统仍然有效,优先考虑能源效率,更多的研究需要专注于找到具有小能量足迹的设备的安全性平衡。 (c)2018 Elsevier Inc.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号