nanoll extt
Please use this identifier to cite or link to this item: http://lrcdrs.bennett.edu.in:80/handle/123456789/1891
Title: Code Tamper-Proofing Using Return Oriented Programming in IoT Devices
Authors: Singh, Simar Preet
Keywords: ARM architecture
Code tampering
Control flow integrity
Internet of Things (IoT) security
Return oriented programming
Issue Date: 2022
Publisher: Springer Science and Business Media Deutschland GmbH
Abstract: An application running on the Internet of Things (IoT) device is vulnerable to code reuse attacks, which makes control flow highjacking relatively easy. Control Flow Integrity (CFI) is widely known to make code tampering harder. Available CFI solutions mostly work for x86 (Intel architecture), but most of the IoT devices use the ARM architecture. This paper presents a novel control-flow obfuscation technique for IoT devices, especially for the ARM architecture. This paper uses Return Oriented Programming (ROP), used for code reuse attacks, to prevent control flow in IoT devices. The proposed method is a selfcontained code integrity verification approach that protects control flow by ROP gadgets and implicitly verifies integrity by “U-probe”. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
URI: https://doi.org/10.1007/978-981-19-1122-4_19
http://lrcdrs.bennett.edu.in:80/handle/123456789/1891
ISSN: 2367-3370
Appears in Collections:Conference/Seminar Papers_ SCSET

Files in This Item:
File SizeFormat 
1056.pdf
  Restricted Access
747.07 kBAdobe PDFView/Open Request a copy

Contact admin for Full-Text

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.