DocumentCode :
1824078
Title :
HeapDefender: A Mechanism of Defending Embedded Systems against Heap Overflow via Hardware
Author :
Li, Dongfang ; Liu, Zhenglin ; Zhao, Yizhi
Author_Institution :
Dept. of Electron. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
fYear :
2012
fDate :
4-7 Sept. 2012
Firstpage :
851
Lastpage :
856
Abstract :
Buffer overflow attacks have been causing serious security problems for decades. While numerous approaches have been proposed to prevent stack overflows, heap overflows remain a security threat and a frequent source of bugs. Embedded systems can be easily attacked by the heap overflow attacks. In this paper, based on analyzing the security of an embedded processor at instruction level, we propose a hardware defense mechanism, Heap Defender, which aims to detect heap buffer overflow attacks. Heap Defender, a module of hardware located the inside of the embedded processor, neither modifies the program nor destroys the pipeline integrity. The instructions parsed in parallel within the Heap Defender are synchronized with the CPU pipeline which makes the Heap Defender have little performance overhead. As demonstrated in an FPGA (Field Programmable Gate Array) prototyping, the experimental results show that Heap Defender can effectively detect heap buffer overflow attacks with around 15% hardware cost overhead and only 0.1% performance penalty.
Keywords :
buffer storage; embedded systems; field programmable gate arrays; instruction sets; parallel programming; security of data; CPU; FPGA; HeapDefender; embedded processor; field programmable gate array; hardware cost overhead; hardware defense mechanism; heap buffer overflow attack detection; heap overflow prevention; instruction level; parallel programming; security threat; stack overflow prevention; Buffer overflow; Embedded systems; Hardware; Monitoring; Payloads; Pipelines; Security; HeapDefender; embedded system; heap overflow;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on
Conference_Location :
Fukuoka
Print_ISBN :
978-1-4673-3084-8
Type :
conf
DOI :
10.1109/UIC-ATC.2012.115
Filename :
6332095
Link To Document :
بازگشت