STACK-BASED BUFFER OVERFLOWS IN HARVARD CLASS EMBEDDED SYSTEMS

被引:0
|
作者
Watts, Kristopher
Oman, Paul
机构
来源
关键词
Embedded systems; Harvard architecture; buffer overflows;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many embedded devices used to control critical infrastructure assets are based on the Harvard architecture. This architecture separates data and program memory into independent address spaces, unlike the von Neumann architecture, which uses a single address space for data and program code. Buffer overflow attacks in desktop and server platforms based on the von Neumann model have been studied extensively. However, buffer overflows in Harvard architectures have only just begun to receive attention. This paper demonstrates that stack-based buffer overflow vulnerabilities exist in embedded devices based on the Harvard architecture and that the vulnerabilities are easily exploited. The paper shows how the reversal in the direction of stack growth simplifies attacks by providing easier access to critical execution controls. Also, the paper examines defense techniques used in server and desktop systems and discusses their applicability to Harvard class machines.
引用
收藏
页码:185 / 197
页数:13
相关论文
共 50 条
  • [1] A stack-based processor for resource efficient embedded systems
    Burutarchanai, A
    Nanthanavoot, P
    Aporntewan, C
    Chongstitvatana, P
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : D439 - D442
  • [2] Fuzz Testing in Stack-Based Buffer Overflow
    Bhardwaj, Manisha
    Bawa, Seema
    ADVANCES IN COMPUTER COMMUNICATION AND COMPUTATIONAL SCIENCES, VOL 1, 2019, 759 : 23 - 36
  • [3] Functional programming on a stack-based embedded processor
    Harris, Andrew J.
    Hayes, John R.
    SMC-IT 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON SPACE MISSION CHALLENGES FOR INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 418 - +
  • [4] Microarchitectural protection against stack-based buffer overflow attacks
    Park, Yong-Joon
    Zhang, Zhao
    Lee, Gyungho
    IEEE MICRO, 2006, 26 (04) : 62 - 71
  • [5] SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
    Chen, Gang
    Jin, Hai
    Zou, Deqing
    Zhou, Bing Bing
    Liang, Zhenkai
    Zheng, Weide
    Shi, Xuanhua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (06) : 368 - 379
  • [6] Protecting binary files from stack-based buffer overflow
    Alouneh, Sahel
    HebaBsoul
    Kharbutli, Mazen
    Lecture Notes in Electrical Engineering, 2015, 339 : 415 - 422
  • [7] Survey of Attacks and Defenses on Stack-based Buffer Overflow Vulnerability
    Wang, Wei
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND COMPUTER SCIENCE (ICEMC 2017), 2017, 73 : 324 - 328
  • [8] Type Systems for Optimizing Stack-based Code
    Saabas, Ando
    Uustalu, Tarmo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 190 (01) : 103 - 119
  • [9] Exploiting stack-based buffer overflow using modern day techniques
    Nicula, Stefan
    Zota, Razvan Daniel
    10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 : 9 - 14
  • [10] Smart fuzzing method for detecting stack-based buffer overflow in binary codes
    Mouzarani, Maryam
    Sadeghiyan, Babak
    Zolfaghari, Mohammad
    IET SOFTWARE, 2016, 10 (04) : 96 - 107