Font Size: a A A

Research On Control Flow Hijacking Attack Methods And Its Implementation On Wireless Network Microprocessors Based On ARM Architecture

Posted on:2021-12-10Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y GuFull Text:PDF
GTID:2518306020982719Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
Internet of Things devices and desktop platforms form the basis of the Cyberphysical system network.Security is a challenge faced by the Internet of Things and cyber-physical systems,and is also one of the hot issues in the industry.With the current wireless network equipment mostly uses the ARM architecture of the microprocessor and operating system,this paper focuses on the security issues of the ARM architecture.Buffer overflow vulnerability is the most common software vulnerability on the ARM platform and widely distributed in various operating systems.With buffer overflow vulnerability in the software program,attackers can initiate control flow hijacking attack to transfer the execution flow of the program.Then,execute the code controlled by attacker to gain control of operating system and perform malicious operation.This paper focuses on the control flow hijacking attack methods and its implementation on ARM-architecture microprocessors,so as to provide some basis for early prevention and control of such possible attacks towards wireless network applications.First,a runtime intrusion prevention evaluator is implemented on an operating system based on ARM-based processor(called RIPE-ARM).It integrates 850 common control flow hijacking attacks,which can be used to evaluate capability of the defense mechanisms deployed on the operating system.Secondly,the QEMU virtual machine is used to build a Raspberry pi platform which based on ARM architecture processor,in order to simulate the runtime environment of programs on ARM architecture devices such as wireless network microprocessors.In addition,we evaluated the platform's defense capability from control flow hijacking attacks through RIPE-ARM.It was found that there are ten types of control flow hijacking attacks that none of the existing defense mechanisms on the platform can mitigate.Thirdly,we analyze the Jump-Oriented Programming(JOP)attack technology based on the Intel architecture,and starts with the specificity of the ARM architecture to study the special problems of JOP attacking the ARM architecture operating system.On this basis,we developed a JOP attack method against the ARM architecture.This kind of attack can bypasses the defense mechanisms such as data execution protection and randomization of address space layout deployed on Raspberry pi,and obtain root permission of operating system.Finally.a benchmark was used to test and compare the time required for JOP and Return-Oriented Programming(ROP)attack technology to successfully attack on the Raspberry pi.Experimental results show that the execution efficiency of JOP attack technology is better than ROP.
Keywords/Search Tags:ARM Architecture, Control-Flow Hijacking, RIPE, JOP attack
PDF Full Text Request
Related items