skip to main content
10.1145/2245276.2232038acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Using faults for buffer overflow effects

Published:26 March 2012Publication History

ABSTRACT

Fault attacks have been developed in the cryptographic community to extract secret information on hardware implementations. They have also been used to bypass security checks during authentication processes for example. Here, we show that they can be exploited to make more damage, taking the control of a machine as buffer overflow attacks do for instance. In this short paper, we demonstrate by using one example that countermeasures against buffer overflow must also be used for software running on embedded processors.

References

  1. R. J. Anderson and M. G. Kuhn. Low Cost Attacks on Tamper Resistant Devices. In B. Christianson, B. Crispo, T. M. A. Lomas, and M. Roe, editors, Security Protocols Workshop, volume 1361 of Lecture Notes in Computer Science, pages 125--136. Springer, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. Cowan, S. Beattie, R. Day, P. w. C. Pu, and E. Walthinsen. Protecting Systels from Stack Smashing Attacks with StackGuard. In Proceedings of the 5th Linux Expo., Raleigh, NC, May 1999.Google ScholarGoogle Scholar
  3. S. Govindavajhala and A. W. Appel. Using Memory Errors to Attack a Virtual Machine. In IEEE Symposium on Security and Privacy, pages 154--165, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. O. Kömmerling and M. G. Kuhn. Design Principles for Tamper-Resistant Smartcard Processors. In WOST'99: Proceedings of the USENIX Workshop on Smartcard Technology, pages 9--20. USENIX Association, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
    March 2012
    2179 pages
    ISBN:9781450308571
    DOI:10.1145/2245276
    • Conference Chairs:
    • Sascha Ossowski,
    • Paola Lecca

    Copyright © 2012 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 26 March 2012

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • poster

    Acceptance Rates

    SAC '12 Paper Acceptance Rate270of1,056submissions,26%Overall Acceptance Rate1,650of6,669submissions,25%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader