What the stack? on memory exploitation and protection in resource constrained automotive systems

A Lautenbach, M Almgren, T Olovsson - … 2017, Lucca, Italy, October 8-13 …, 2018 - Springer
Critical Information Infrastructures Security: 12th International Conference …, 2018Springer
The increased connectivity of road vehicles poses significant challenges for transportation
security, and automotive security has rapidly gained attention in recent years. One of the
most dangerous kinds of security relevant software bugs are related to memory corruption,
since their successful exploitation would grant the attacker a high degree of influence over
the compromised system. Such vulnerabilities and the corresponding mitigation techniques
have been widely studied for regular IT systems, but we identified a gap with respect to …
Abstract
The increased connectivity of road vehicles poses significant challenges for transportation security, and automotive security has rapidly gained attention in recent years. One of the most dangerous kinds of security relevant software bugs are related to memory corruption, since their successful exploitation would grant the attacker a high degree of influence over the compromised system. Such vulnerabilities and the corresponding mitigation techniques have been widely studied for regular IT systems, but we identified a gap with respect to resource constrained automotive systems.
In this paper, we discuss how the hardware architecture of resource constrained automotive systems impacts memory exploitation techniques and their implications for memory protection. Currently deployed systems have little to no protection from memory exploitation. However, based on our analysis we find that the simple and well-known measures like stack canaries, non-executable RAM, and to a limited extent memory layout randomization can also be deployed in this domain to significantly raise the bar for successful exploitation.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果