μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems

Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    4 Citations (Scopus)
    9 Downloads (Pure)

    Abstract

    Embedded devices are playing a major role in our way of life. Similar to other computer systems embedded devices are vulnerable to code-reuse attacks. Compromising these devices in a critical environment constitute a significant security and safety risk. In this paper, we present μShield, a memory corruption exploitation mitigation system for embedded COTS binaries with configurable protection policies that do not rely on any hardware-specific feature. Our evaluation shows that μShield provides its protection with a limited performance overhead.
    Original languageEnglish
    Title of host publicationNetwork and System Security
    Subtitle of host publication11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings
    EditorsZheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
    PublisherSpringer
    Pages694-709
    Number of pages15
    ISBN (Electronic)978-3-319-64701-2
    ISBN (Print)978-3-319-64700-5
    DOIs
    Publication statusPublished - 21 Aug 2017
    Event11th International Conference on Network and System Security, NSS 2017 - Helsinki, Finland
    Duration: 21 Aug 201723 Aug 2017
    Conference number: 11
    https://research.comnet.aalto.fi/NSS2017/

    Publication series

    Name Lecture Notes in Computer Science
    Volume10394

    Conference

    Conference11th International Conference on Network and System Security, NSS 2017
    Abbreviated titleNSS
    Country/TerritoryFinland
    CityHelsinki
    Period21/08/1723/08/17
    Internet address

    Keywords

    • Embedded
    • Code Reuse
    • Heuristics
    • ARM
    • Exploit
    • ROP

    Fingerprint

    Dive into the research topics of 'μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems'. Together they form a unique fingerprint.

    Cite this