Experimental Evaluation of the Defense Capability of ARM-based Systems against Buffer Overflow Attacks in Wireless Networks

Sun Zhou, Jun Chen
{"title":"Experimental Evaluation of the Defense Capability of ARM-based Systems against Buffer Overflow Attacks in Wireless Networks","authors":"Sun Zhou, Jun Chen","doi":"10.1109/ICEIEC49280.2020.9152302","DOIUrl":null,"url":null,"abstract":"Buffer overflow attack is one of the mainstream attacks towards the ARM architecture. It may lead to consequences such as program failure or system privileges loss. The mainstream operating systems deploy multiple defense mechanisms to mitigate such attacks. However, so far there are few reports on evaluation of the defense capability of ARM-based operating systems from buffer overflow attacks. In this paper, firstly, we implemented the Runtime Intrusion Prevention Evaluator on ARM-based operating systems, which we called RIPE-ARM. In that evaluator, 850 kinds of effective buffer overflow attacks are integrated for test. Secondly, by using the QEMU virtual machine, an ARM-based system, Raspberry Pi, was set up for the experiment; and then, the RIPE-ARM was used to test and evaluate the defense capability of Raspberry Pi. We identified the kinds of attacks that each defense or defense combination can successfully prevent, respectively. Among all the defense methods, the Canary + DEP combination turns out to be optimal that is able to make 840 out of the total 850 kinds of attacks fail. Furthermore, for comparison, the defense capability of Ubuntu 16.04 LTS system based on X86 architecture was also tested. The results show that the optimal defense method of that system can prevent only 790 attack kinds.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEIEC49280.2020.9152302","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Buffer overflow attack is one of the mainstream attacks towards the ARM architecture. It may lead to consequences such as program failure or system privileges loss. The mainstream operating systems deploy multiple defense mechanisms to mitigate such attacks. However, so far there are few reports on evaluation of the defense capability of ARM-based operating systems from buffer overflow attacks. In this paper, firstly, we implemented the Runtime Intrusion Prevention Evaluator on ARM-based operating systems, which we called RIPE-ARM. In that evaluator, 850 kinds of effective buffer overflow attacks are integrated for test. Secondly, by using the QEMU virtual machine, an ARM-based system, Raspberry Pi, was set up for the experiment; and then, the RIPE-ARM was used to test and evaluate the defense capability of Raspberry Pi. We identified the kinds of attacks that each defense or defense combination can successfully prevent, respectively. Among all the defense methods, the Canary + DEP combination turns out to be optimal that is able to make 840 out of the total 850 kinds of attacks fail. Furthermore, for comparison, the defense capability of Ubuntu 16.04 LTS system based on X86 architecture was also tested. The results show that the optimal defense method of that system can prevent only 790 attack kinds.
基于arm的无线网络系统防御缓冲区溢出攻击能力的实验评估
缓冲区溢出攻击是针对ARM架构的主流攻击之一。它可能导致程序失败或系统特权丢失等后果。主流操作系统部署了多种防御机制来减轻此类攻击。然而,目前关于基于arm的操作系统对缓冲区溢出攻击的防御能力评估的报道很少。本文首先在基于arm的操作系统上实现了运行时入侵防御评估器,我们称之为RIPE-ARM。在该评估器中,集成了850种有效的缓冲区溢出攻击进行测试。其次,利用QEMU虚拟机,搭建了一个基于arm的系统树莓派进行实验;然后,使用RIPE-ARM测试和评估树莓派的防御能力。我们分别确定了每种防御或防御组合可以成功阻止的攻击类型。在所有的防御方法中,Canary + DEP组合是最优的,可以使850种攻击中的840种失败。此外,为了比较,我们还测试了基于X86架构的Ubuntu 16.04 LTS系统的防御能力。结果表明,该系统的最优防御方法仅能防御790种攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信