期刊论文详细信息
IEEE Access
A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device
Tongsheng Xia1  Hongge Li1  Zhun Zhang1  Xiang Wang1  Qiang Hao1  Weike Wang1  Bin Xu1  Pei Du1 
[1] School of Electronic and Information Engineering, Beihang University, Beijing, China;
关键词: Security;    buffer overflow;    IoT device;    execution behavior;    intrusion detection;    secure tag;   
DOI  :  10.1109/ACCESS.2018.2881447
来源: DOAJ
【 摘 要 】

At present, the IoT devices face many kinds of software and hardware attacks, especially buffer overflow attacks. This paper presents an architectural-enhanced security hardware design to detect buffer overflow attacks. One part of the design is instructions monitoring and verification used to trace the execution behavior of programs. Another one is secure tag validation used to monitor the attributes of every memory segment. The automated extraction tools extract the monitoring model and secure tag of each memory segment at the compile time. At run-time, the designed hardware observes its dynamic execution trace and checks whether the trace conforms to the permissible behavior, if not the appropriate response mechanisms will be triggered. The proposed schemes don’t change the compiler or the existing instruction set and imposes no restriction to the software developer. The architectural design is implemented on an actual OR1200-FPGA platform. The experimental analysis shows that the proposed techniques can detect a wide range of buffer overflow attacks. And it takes low performance penalties and minimal overheads.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次