2019 IEEE European Symposium on Security and Privacy (EuroS&P) 2019
DOI: 10.1109/eurosp.2019.00013
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

Abstract: Memory corruption vulnerabilities have been around for decades and rank among the most prevalent vulnerabilities in embedded systems. Yet this constrained environment poses unique design and implementation challenges that significantly complicate the adoption of common hardening techniques. Combined with the irregular and involved nature of embedded patch management, this results in prolonged vulnerability exposure windows and vulnerabilities that are relatively easy to exploit. Considering the sensitive and c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
30
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 31 publications
(32 citation statements)
references
References 18 publications
1
30
0
1
Order By: Relevance
“…MCUS run a single binary image either as baremetal (i.e., with no OS), or are coupled with a light-weight OS (e.g., Mbed-OS or FreeRTOS [7], [8]). Existing solutions to protect MCUS [9]- [20], are still not deployed as they either require special hardware extensions, incur high overhead, or have limited security guarantees. So far, deployed MCUS lack essential protections that are available in their desktop counterparts [16]- [18], such as Data Execution Prevention (DEP), stack canaries [21], and Address Space Layout Randomization (ASLR).…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…MCUS run a single binary image either as baremetal (i.e., with no OS), or are coupled with a light-weight OS (e.g., Mbed-OS or FreeRTOS [7], [8]). Existing solutions to protect MCUS [9]- [20], are still not deployed as they either require special hardware extensions, incur high overhead, or have limited security guarantees. So far, deployed MCUS lack essential protections that are available in their desktop counterparts [16]- [18], such as Data Execution Prevention (DEP), stack canaries [21], and Address Space Layout Randomization (ASLR).…”
Section: Introductionmentioning
confidence: 99%
“…ROP is a code reuse attack targeting backward edges, allowing an attacker to perform arbitrary execution. ROP remains a viable attack vector even in presence of other defenses such as stack canaries [20], [21], and randomization [17].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations