DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices
Download
Author
Javid Habibi, Ajay Panicker, Aditi Gupta, and Elisa Bertino
Tech report number
CERIAS TR 2015-15
Entry type
article
Abstract
Security of embedded devices today is a critical requirement for the Internet of Things (IoT) as these devices will access sensitive information such as social security numbers and health records. This makes these devices a lucrative target for attacks exploiting vulnerabilities to inject malicious code or reuse existing code to alter the execution of
their software. Existing defense techniques have major drawbacks such as requiring source code or symbolic debugging information, and high overhead, limiting their applicability. In this paper we propose a novel defense technique, DisARM, that protects against both code-injection and code-reuse based buffer overflow attacks by breaking the ability for attackers to manipulate the return address of a function. Our approach operates on arbitrary executable binaries and thus does not require compiler support. In addition it does not require user interactions and can thus be automatically applied. Our experimental results show that our approach incurs low overhead and significantly increases the level of security against both code-injection and code-reuse based attacks.
Download
Date
2015 – 9 – 9
Key alpha
Bertino
Publication Date
2015-09-09

