基于arm的无线网络系统运行时入侵防御评估

Sun Zhou
{"title":"基于arm的无线网络系统运行时入侵防御评估","authors":"Sun Zhou","doi":"10.1109/CCET50901.2020.9213116","DOIUrl":null,"url":null,"abstract":"Nowadays, most wireless communication modules are built based on ARM-based chips. Buffer overflow attack (BOA) is one of the mainstream runtime intrusion on the ARM architecture. However, so far there are few reports on evaluation of the intrusion prevention capability of ARM-based operating systems from BOAs. To provide with such evaluation, in this paper, first, the Runtime Intrusion Prevention Evaluator was implemented on ARM-based operating systems, which we called RIPE-ARM, where 850 kinds of effective BOAs are integrated. Next, using the QEMU virtual machine, we set up an ARM-based system, Raspberry Pi, for the evaluation. Then, the RIPE-ARM was used to test and evaluate the intrusion prevention capability of Raspberry Pi. The kinds of BOAs that each defense or defense combination can successfully prevent were identified, respectively. We found that among all these defense methods, there is one combinational method turns out to be optimal that is able to make 840 of the total 850 kinds of attacks fail. Also, the results show that there are ten BOA kinds that no defense can mitigate. Those kinds are presented in details.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Evaluation of the Runtime Intrusion Prevention of ARM-Based Systems in Wireless Networks\",\"authors\":\"Sun Zhou\",\"doi\":\"10.1109/CCET50901.2020.9213116\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, most wireless communication modules are built based on ARM-based chips. Buffer overflow attack (BOA) is one of the mainstream runtime intrusion on the ARM architecture. However, so far there are few reports on evaluation of the intrusion prevention capability of ARM-based operating systems from BOAs. To provide with such evaluation, in this paper, first, the Runtime Intrusion Prevention Evaluator was implemented on ARM-based operating systems, which we called RIPE-ARM, where 850 kinds of effective BOAs are integrated. Next, using the QEMU virtual machine, we set up an ARM-based system, Raspberry Pi, for the evaluation. Then, the RIPE-ARM was used to test and evaluate the intrusion prevention capability of Raspberry Pi. The kinds of BOAs that each defense or defense combination can successfully prevent were identified, respectively. We found that among all these defense methods, there is one combinational method turns out to be optimal that is able to make 840 of the total 850 kinds of attacks fail. Also, the results show that there are ten BOA kinds that no defense can mitigate. Those kinds are presented in details.\",\"PeriodicalId\":236862,\"journal\":{\"name\":\"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)\",\"volume\":\"123 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCET50901.2020.9213116\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCET50901.2020.9213116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

目前,大多数无线通信模块都是基于arm芯片构建的。缓冲溢出攻击(BOA)是ARM体系结构上主流的运行时入侵方式之一。然而,目前从boa角度对arm操作系统的入侵防御能力进行评估的报道很少。为了提供这种评估,本文首先在基于arm的操作系统上实现了运行时入侵防御评估器,我们称之为RIPE-ARM,其中集成了850种有效的boa。接下来,使用QEMU虚拟机,我们建立了一个基于arm的系统,树莓派,进行评估。然后,利用RIPE-ARM对树莓派的入侵防御能力进行测试和评估。分别识别了每种防御或防御组合能够成功防御的boa类型。我们发现,在所有这些防御方法中,有一种组合方法被证明是最优的,能够使总共850种攻击中的840种失败。结果还表明,有10种BOA是没有防御措施可以缓解的。详细介绍了这些类型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Evaluation of the Runtime Intrusion Prevention of ARM-Based Systems in Wireless Networks
Nowadays, most wireless communication modules are built based on ARM-based chips. Buffer overflow attack (BOA) is one of the mainstream runtime intrusion on the ARM architecture. However, so far there are few reports on evaluation of the intrusion prevention capability of ARM-based operating systems from BOAs. To provide with such evaluation, in this paper, first, the Runtime Intrusion Prevention Evaluator was implemented on ARM-based operating systems, which we called RIPE-ARM, where 850 kinds of effective BOAs are integrated. Next, using the QEMU virtual machine, we set up an ARM-based system, Raspberry Pi, for the evaluation. Then, the RIPE-ARM was used to test and evaluate the intrusion prevention capability of Raspberry Pi. The kinds of BOAs that each defense or defense combination can successfully prevent were identified, respectively. We found that among all these defense methods, there is one combinational method turns out to be optimal that is able to make 840 of the total 850 kinds of attacks fail. Also, the results show that there are ten BOA kinds that no defense can mitigate. Those kinds are presented in details.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信