Hardware-Based Stack Smashing Attack Detection & Preliminaries on Recovery Procedure

FABIAN, VARGAS and LETICIA BOLZANI, POEHLS and RAPHAEL SEGABINAZZI, FERREIRA (2016) Hardware-Based Stack Smashing Attack Detection & Preliminaries on Recovery Procedure. In: Fourth International Conference on Advances In Computing, Control And Networking - ACCN 2016, 07 - 08 May, 2016, Bangkok, Thailand.

[img]
Preview
Text
20160517_043950.pdf - Published Version

Download (440kB) | Preview
Official URL: https://www.seekdl.org/conferences/paper/details/7...

Abstract

In recent years, computer systems belonging to large companies, governments as well as personal computers have been experiencing an increasing wave of attacks that disrupt their normal operation or leak sensitive data. In this context, this paper presents a hardware-based approach (here namely a watchdog connected to the processor bus) which aims at detecting and recovering the system from stack smashing buffer overflow attack. Compared to existing approaches, the proposed technique does not need application code recompilation or use of any kind of supervisor software (e.g., an Operating System - OS) to manage memory usage. To validate the approach, a case-study based on the LEON3 softcore processor and benchmark test codes have been implemented. Experimental results indicate that this approach is able to detect and recover from an intrusion tentative for 100% of the test cases, while yielding low area overhead, negligible attack detection latency and processor performance degradation.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: Stack Smashing Buffer Overflow Attack, Malicious Code Injection, Attack Detection and Recovery, Dynamic Integrity Checking, Secure Embedded System.
Depositing User: Mr. John Steve
Date Deposited: 23 Mar 2019 12:12
Last Modified: 23 Mar 2019 12:12
URI: http://publications.theired.org/id/eprint/859

Actions (login required)

View Item View Item