Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software

被引:67
|
作者
Shao, ZL [1 ]
Xue, C
Zhuge, QF
Qiu, MK
Xiao, B
Sha, EHM
机构
[1] Hong Kong Polytech Univ, Dept Comp, Kowloon, Hong Kong, Peoples R China
[2] Univ Texas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
security; buffer overflow attack; embedded system; hardware/software; protection;
D O I
10.1109/TC.2006.59
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With more embedded systems networked, it becomes an important problem to effectively defend embedded systems against buffer overflow attacks. Due to the increasing complexity and strict requirements, off-the-shelf software components are widely used in embedded systems, especially for military and other critical applications. Therefore, in addition to effective protection, we also need to provide an approach for system integrators to efficiently check whether software components have been protected. In this paper, we propose the HSDefender ( Hardware/Software Defender) technique to perform protection and checking together. Our basic idea is to design secure call instructions so systems can be secured and checking can be easily performed. In the paper, we classify buffer overflow attacks into two categories and provide two corresponding defending strategies. We analyze the HSDefender technique with respect to hardware cost, security, and performance. We experiment with our HSDefender technique on the SimpleScalar/ARM simulator with benchmarks from MiBench, an embedded benchmark suite. The results show that our HSDefender technique can defend a system against more types of buffer overflow attacks with less overhead compared with the previous work.
引用
收藏
页码:443 / 453
页数:11
相关论文
共 40 条
  • [1] Security protection and checking in embedded system integration against buffer overflow attacks
    Shao, ZL
    Xue, C
    Zhuge, QF
    Sha, EHM
    Xiao, B
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 409 - 413
  • [2] Efficient array & pointer bound checking against buffer overflow attacks via hardware/software
    Shao, ZL
    Xue, C
    Zhuge, QF
    Sha, EHM
    Xiao, B
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 780 - 785
  • [3] Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks
    Shao, Zili
    Cao, Jiannong
    Chan, Keith C. C.
    Xue, Chun
    Sha, Edwin H. -M.
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (09) : 1129 - 1136
  • [4] Defending embedded systems against buffer overflow via Hardware/Software
    Shao, Z
    Zhuge, QF
    He, Y
    Sha, EHM
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 352 - 361
  • [5] Assuring Software Security Against Buffer Overflow Attacks in Embedded Software Development Life Cycle
    Park, Chul Su
    Lee, Jae Hee
    Seo, Seong Chae
    Kim, Byung Ki
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 787 - 790
  • [6] Protection against Buffer Overflow Attacks via Dynamic Binary Translation
    Chen, Chun-Chung
    Hung, Shih-Hao
    Lee, Chen-Pang
    RELIABLE AND AUTONOMOUS COMPUTATIONAL SCIENCE, 2011, : 305 - +
  • [7] Libsafe: Transparent system-wide protection against buffer overflow attacks
    Tsai, T
    Singh, N
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 541 - 541
  • [8] SegmentShield: Exploiting segmentation hardware for protecting against buffer overflow attacks
    Shinagawa, Takahiro
    SRDS 2006: 25TH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, : 277 - 286
  • [9] BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
    Rao, Jinli
    He, Zhangqing
    Xu, Shu
    Dai, Kui
    Zou, Xuecheng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2002 - 2009
  • [10] FFRR: a software diversity technique for defending against buffer overflow attacks
    Kisore, N. Raghu
    Kumar, K. Shiva
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (1-2) : 40 - 74