What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems
|
|
- Scarlett Potter
- 5 years ago
- Views:
Transcription
1 What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems Aljoscha Lautenbach Magnus Almgren Tomas Olovsson Dept. of Computer Science and Engineering Chalmers University of Technology Gothenburg, Sweden CRITIS 2017 The International Conference on Critical Information Infrastructures Security Lucca, Italy 11 October, 2017 A. Lautenbach (CHALMERS) What the Stack? CRITIS 1 / 20
2 Why automotive security? Connected vehicles Communication systems: Bluetooth, Wireless LAN, IEEE p, Radio Data System (RDS), telecommunication (3G/4G/soon 5G),... Intelligent transport systems (ITS) Self-driving cars A. Lautenbach (CHALMERS) What the Stack? CRITIS 2 / 20
3 Why automotive security? Connected vehicles Communication systems: Bluetooth, Wireless LAN, IEEE p, Radio Data System (RDS), telecommunication (3G/4G/soon 5G),... Intelligent transport systems (ITS) Self-driving cars Security perspective Automotive security mostly focuses on communications A. Lautenbach (CHALMERS) What the Stack? CRITIS 2 / 20
4 The in-vehicle network Picture source: Nowdehi N., Lautenbach A., Olovsson T. In-vehicle CAN message authentication: An evaluation based on industrial criteria. Vehicular Technology Conference Fall A. Lautenbach (CHALMERS) What the Stack? CRITIS 3 / 20
5 The in-vehicle network Picture source: Nowdehi N., Lautenbach A., Olovsson T. In-vehicle CAN message authentication: An evaluation based on industrial criteria. Vehicular Technology Conference Fall A. Lautenbach (CHALMERS) What the Stack? CRITIS 3 / 20
6 Electronic control unit (ECU) security What is the problem? Exploitation of memory corruption bugs! A. Lautenbach (CHALMERS) What the Stack? CRITIS 4 / 20
7 Electronic control unit (ECU) security What is the problem? Exploitation of memory corruption bugs! Checkoway et al. (2011) We also encourage the use of simple anti-exploitation mitigations such as stack cookies and ASLR that can be easily implemented even for simple processors [...] A. Lautenbach (CHALMERS) What the Stack? CRITIS 4 / 20
8 Typical ECU hardware Typical ranges for resource constrained microcontrollers Hardware Specification Most Common RAM 4 KB KB 40 KB Flash Memory 256 KB - 6 MB 1 MB Processor Speed MHz 80 MHz A. Lautenbach (CHALMERS) What the Stack? CRITIS 5 / 20
9 ECU memory (1) Types of memory Flash memory: boot loader, OS, tasks RAM Data flash Memory mapped Input/Output A. Lautenbach (CHALMERS) What the Stack? CRITIS 6 / 20
10 ECU memory (2) Memory properties No memory management unit (MMU), i.e., no virtual memory Statically assigned memory Memory protection unit (use optional) A. Lautenbach (CHALMERS) What the Stack? CRITIS 7 / 20
11 Linear address space A. Lautenbach (CHALMERS) What the Stack? CRITIS 8 / 20
12 Static task memory mapping into RAM A. Lautenbach (CHALMERS) What the Stack? CRITIS 9 / 20
13 Memory exploitation and protection Attacks and defenses 1. Buffer overflows and stack canaries (aka stack cookies or stack-guards) 2. Buffer overflows and non-executable RAM 3. Return oriented programming (ROP) and compile-time randomization A. Lautenbach (CHALMERS) What the Stack? CRITIS 10 / 20
14 Exploiting buffer overflows A. Lautenbach (CHALMERS) What the Stack? CRITIS 11 / 20
15 Buffer overflows and stack canaries A. Lautenbach (CHALMERS) What the Stack? CRITIS 12 / 20
16 Stack canaries - pros and cons Pros Protects against simple buffer overflow attacks Simple to implement Proven technique (desktops and servers) Cons Performance degradation A. Lautenbach (CHALMERS) What the Stack? CRITIS 13 / 20
17 Buffer overflows and non-executable RAM A. Lautenbach (CHALMERS) What the Stack? CRITIS 14 / 20
18 Non-executable RAM - pros and cons Pros Protects against all standard buffer overflow attacks Already supported by MPUs Cons Sometimes RAM must be executable, e.g., during firmware upgrades. A. Lautenbach (CHALMERS) What the Stack? CRITIS 15 / 20
19 Return oriented programming (ROP) A. Lautenbach (CHALMERS) What the Stack? CRITIS 16 / 20
20 Compile-time layout randomization Standard layout Randomized layout A. Lautenbach (CHALMERS) What the Stack? CRITIS 17 / 20
21 Compile-time layout randomization - pros and cons Pros Raises the bar for successful ROP attacks Cons Low entropy Requires production changes (costly) Only of interest once non-executable RAM has been implemented A. Lautenbach (CHALMERS) What the Stack? CRITIS 18 / 20
22 Conclusions Stack canaries should be used Non-executable RAM should be used Layout randomization is hard to implement in practice further research is needed A. Lautenbach (CHALMERS) What the Stack? CRITIS 19 / 20
23 Thank you! A. Lautenbach (CHALMERS) What the Stack? CRITIS 20 / 20
Is Exploitation Over? Bypassing Memory Protections in Windows 7
Is Exploitation Over? Bypassing Memory Protections in Windows 7 Alexander Sotirov alex@sotirov.net About me Exploit development since 1999 Published research into reliable exploitation techniques: Heap
More informationSoftware Security II: Memory Errors - Attacks & Defenses
1 Software Security II: Memory Errors - Attacks & Defenses Chengyu Song Slides modified from Dawn Song 2 Administrivia Lab1 Writeup 3 Buffer overflow Out-of-bound memory writes (mostly sequential) Allow
More informationCSE 127: Computer Security. Memory Integrity. Kirill Levchenko
CSE 127: Computer Security Memory Integrity Kirill Levchenko November 18, 2014 Stack Buffer Overflow Stack buffer overflow: writing past end of a stackallocated buffer Also called stack smashing One of
More informationCS 161 Computer Security
Paxson Spring 2017 CS 161 Computer Security Discussion 2 Question 1 Software Vulnerabilities (15 min) For the following code, assume an attacker can control the value of basket passed into eval basket.
More informationin memory: an evolution of attacks Mathias Payer Purdue University
in memory: an evolution of attacks Mathias Payer Purdue University Images (c) MGM, WarGames, 1983 Memory attacks: an ongoing war Vulnerability classes according to CVE Memory
More informationQPSI. Qualcomm Technologies Countermeasures Update
QPSI Qualcomm Technologies Countermeasures Update 1 Introduction Sometime back in 2010 Let s have exploit countermeasures on our products Why? Hard to fix all bugs. We might as well make them more fun
More informationLecture 08 Control-flow Hijacking Defenses
Lecture 08 Control-flow Hijacking Defenses Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides adapted from Miller, Bailey, and Brumley Control Flow Hijack: Always control + computation
More informationComputer Security Course. Midterm Review
Computer Security Course. Dawn Song Midterm Review In class: Logistics On time: 4:10-5:30pm Wed 1 8x11 page cheat sheet allowed Special requirements: see TA Part I, II, III Scope Software Security Secure
More informationBuffer Overflow Defenses
Buffer Overflow Defenses Some examples, pros, and cons of various defenses against buffer overflows. Caveats: 1. Not intended to be a complete list of products that defend against buffer overflows. 2.
More informationApplications. Cloud. See voting example (DC Internet voting pilot) Select * from userinfo WHERE id = %%% (variable)
Software Security Requirements General Methodologies Hardware Firmware Software Protocols Procedure s Applications OS Cloud Attack Trees is one of the inside requirement 1. Attacks 2. Evaluation 3. Mitigation
More informationKey Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge
Key Threats Internet was just growing Mail was on the verge Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering Key Threats Code Red and Nimda (2001), Blaster (2003), Slammer
More informationAutomotive Attack Surfaces. UCSD and University of Washington
Automotive Attack Surfaces UCSD and University of Washington Current Automotive Environment Modern cars are run by tens of ECUs comprising millions of lines of code ECUs are well connected over internal
More informationCS 161 Computer Security
Paxson Spring 2011 CS 161 Computer Security Discussion 1 January 26, 2011 Question 1 Buffer Overflow Mitigations Buffer overflow mitigations generally fall into two categories: (i) eliminating the cause
More informationStack Vulnerabilities. CS4379/5375 System Security Assurance Dr. Jaime C. Acosta
1 Stack Vulnerabilities CS4379/5375 System Security Assurance Dr. Jaime C. Acosta Part 1 2 3 An Old, yet Still Valid Vulnerability Buffer/Stack Overflow ESP Unknown Data (unused) Unknown Data (unused)
More informationOpen Source in Automotive Infotainment
Open Source in Automotive Infotainment Taeyong Kim (ty.kim@windriver.com) Services & Solutions Wind River Systems 2015 Wind River. All Rights Reserved. Why using Open Source in IoT? Internet of Things
More informationInfluential OS Research Security. Michael Raitza
Influential OS Research Security Michael Raitza raitza@os.inf.tu-dresden.de 1 Security recap Various layers of security Application System Communication Aspects of security Access control / authorization
More informationFirmware Updates for Internet of Things Devices
Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware
More informationCSCI 1800 Cybersecurity and International Relations. Computer Hardware & Software John E. Savage Brown University
CSCI 1800 Cybersecurity and International Relations Computer Hardware & Software John E. Savage Brown University Overview Introduction computer design Central Processing Unit (CPU) Random Access Memory
More informationIntroduction. What is an Operating System? A Modern Computer System. Computer System Components. What is an Operating System?
Introduction CSCI 315 Operating Systems Design Department of Computer Science What is an Operating System? A Modern Computer System Computer System Components Disks... Mouse Keyboard Printer 1. Hardware
More informationForskning inom datasäkerhet Tomas Olovsson
Forskning inom datasäkerhet Tomas Olovsson Facts and Figures Employees at department: 160 Faculty members: 75 PhD students: 70 Full time students: 1100 (360 GU) 120 courses at 20 programmes Thirty nationalities
More informationAdversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov
Adversary Models CPEN 442 Introduction to Computer Security Konstantin Beznosov why we need adversary models? attacks and countermeasures are meaningless without 2 elements of an adversary model objectives
More informationAttacking the Linux PRNG on Android. David Kaplan, Sagi Kedmi, Roee Hay & Avi Dayan IBM Security Systems
Attacking the Linux PRNG on Android David Kaplan, Sagi Kedmi, Roee Hay & Avi Dayan IBM Security Systems MOTIVATION motivation_keystore_buffer_overflow We discovered CVE-2014-3100, a stack-based Buffer
More informationSicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017
Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen Axel Freiwald 1/2017 All OEMs Will Implement Software OTA As Soon As Possible IHS Study Motivation: Save on recalls caused by software bugs Evolution
More informationMemory corruption countermeasures
Secure Programming Lecture 6: Memory Corruption IV (Countermeasures) David Aspinall, Informatics @ Edinburgh 30th January 2014 Outline Announcement Recap Containment and curtailment Stack tamper detection
More informationAutomotive Cyber Security
Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18
More informationStack Overflow. Faculty Workshop on Cyber Security May 23, 2012
Stack Overflow Faculty Workshop on Cyber Security May 23, 2012 Goals Learn to hack into computer systems using buffer overflow Steal sensitive data Crash computer programs Lay waste to systems throughout
More informationSoK: Eternal War in Memory
SoK: Eternal War in Memory László Szekeres, Mathias Payer, Tao Wei, Dawn Song Presenter: Wajih 11/7/2017 Some slides are taken from original S&P presentation 1 What is SoK paper? Systematization of Knowledge
More informationLecture 10 Code Reuse
Lecture 10 Code Reuse Computer and Network Security 4th of December 2017 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 10, Code Reuse 1/23 Defense Mechanisms static & dynamic analysis
More informationSurvey of Cyber Moving Targets. Presented By Sharani Sankaran
Survey of Cyber Moving Targets Presented By Sharani Sankaran Moving Target Defense A cyber moving target technique refers to any technique that attempts to defend a system and increase the complexity of
More informationProtection. Thierry Sans
Protection Thierry Sans Protecting Programs How to lower the risk of a program security flaw resulting from a bug? 1. Build better programs 2. Build better operating systems Build Better Programs Why are
More informationSoftware Architecture. Definition of Software Architecture. The importance of software architecture. Contents of a good architectural model
Software Architecture Definition of Software Architecture Software architecture is process of designing g the global organization of a software system, including: Dividing software into subsystems. Deciding
More informationBypassing Mitigations by Attacking JIT Server in Microsoft Edge
Bypassing Mitigations by Attacking JIT Server in Microsoft Edge Ivan Fratric Infiltrate 2018 About me Security researcher at Google Project Zero Previously: Google Security Team, Academia (UNIZG) Doing
More informationCisco (AWLANFE) Advanced Wireless LAN for Field Engineers (AWLANFE) Practice Test. Version
Cisco 642-631 642-631 (AWLANFE) Advanced Wireless LAN for Field Engineers (AWLANFE) Practice Test Version 3.1 QUESTION NO: 1 Which service component in the wireless operate phase helps isolate and resolve
More informationCODEBLUE Takahiro Matsuki (FFRI) Dennis Kengo Oka (ETAS)
CODEBLUE 2014.12.18-19 Takahiro Matsuki (FFRI) Dennis Kengo Oka (ETAS) Introduction About ECU Software Overview of TriCore Investigation and Confirmation of Attack Methods Demo Summary and Future Plans
More informationPROTECTION FOR EVERY ENTERPRISE. How BlackBerry Security Works. Whitepaper. Brochure. Whitepaper
1 PROTECTION FOR EVERY ENTERPRISE How Security Works Whitepaper Whitepaper Brochure 2 Why Mobile Security Matters More than Ever The BYOD trend has re-shaped enterprise mobility. While its pros and cons
More informationIntroduction to Operating Systems Prof. Chester Rebeiro Department of Computer Science and Engineering Indian Institute of Technology, Madras
Introduction to Operating Systems Prof. Chester Rebeiro Department of Computer Science and Engineering Indian Institute of Technology, Madras Week 08 Lecture 38 Preventing Buffer Overflow Attacks Hello.
More informationExploiting Stack Buffer Overflows Learning how blackhats smash the stack for fun and profit so we can prevent it
Exploiting Stack Buffer Overflows Learning how blackhats smash the stack for fun and profit so we can prevent it 29.11.2012 Secure Software Engineering Andreas Follner 1 Andreas Follner Graduated earlier
More informationHomework 5: Exam Review
CIS 331 April 18, 2017 Introduction to Networks & Security Homework 5: Exam Review Homework 5: Exam Review This homework is due Wednesday, April 26 at 10 p.m.. You will have a budget of five late days
More informationSecurity and Exploit Mitigation. CMSC Spring 2016 Lawrence Sebald
Security and Exploit Mitigation CMSC 421 - Spring 2016 Lawrence Sebald Security is of Supreme Importance in Systems As we have seen in the past two classes, even with sophisticated security systems, small
More informationGreen Lights Forever: Analyzing the Security of Traffic Infrastructure
Green Lights Forever: Analyzing the Security of Traffic Infrastructure RAJSHAKHAR PAUL Outline Introduction Anatomy of a Traffic Infrastructure Case Study Threat Model Types of Attack Recommendation Broader
More informationHomework 3 CS161 Computer Security, Fall 2008 Assigned 10/07/08 Due 10/13/08
Homework 3 CS161 Computer Security, Fall 2008 Assigned 10/07/08 Due 10/13/08 For your solutions you should submit a hard copy; either hand written pages stapled together or a print out of a typeset document
More informationEURECOM 6/2/2012 SYSTEM SECURITY Σ
EURECOM 6/2/2012 Name SYSTEM SECURITY 5 5 5 5 5 5 5 5 5 5 50 1 2 3 4 5 6 7 8 9 10 Σ Course material is not allowed during the exam. Try to keep your answers precise and short. You will not get extra points
More informationDEFENSIVE PROGRAMMING. Lecture for EDA 263 Magnus Almgren Department of Computer Science and Engineering Chalmers University of Technology
DEFENSIVE PROGRAMMING Lecture for EDA 263 Magnus Almgren Department of Computer Science and Engineering Chalmers University of Technology Traditional Programming When writing a program, programmers typically
More informationBluegiga WF121 Wi-Fi Module. Embedded Wi-Fi modules. for affordable connectivity
Embedded Wi-Fi modules for affordable connectivity Bluegiga WF121 Wi-Fi Module WF121 is a standalone programmable Wi-Fi module with integrated TCP/IP s tack. It is an ideal product for embedded applications
More informationInject malicious code Call any library functions Modify the original code
Inject malicious code Call any library functions Modify the original code 2 Sadeghi, Davi TU Darmstadt 2012 Secure, Trusted, and Trustworthy Computing Chapter 6: Runtime Attacks 2 3 Sadeghi, Davi TU Darmstadt
More informationIndependent Security Researcher. (Former) Security Researcher. ICS IoT Automotive Medical Access Controls Networking & Firewalls
Independent Security Researcher ICS IoT Automotive Medical Access Controls Networking & Firewalls (Former) Security Researcher Critical Infrastructure Embedded BinSec HIDS / NIDS @s4mvartaka www.midnightbluelabs.com
More informationReserve Engineering & Buffer Overflow Attacks. Tom Chothia Computer Security, Lecture 17
Reserve Engineering & Buffer Overflow Attacks Tom Chothia Computer Security, Lecture 17 Introduction A simplified, high-level view of buffer overflow attacks. x86 architecture overflows on the stack Some
More informationSmart Attacks require Smart Defence Moving Target Defence
Smart Attacks require Smart Defence Moving Target Defence Prof. Dr. Gabi Dreo Rodosek Executive Director of the Research Institute CODE 1 Virtual, Connected, Smart World Real World Billions of connected
More informationThis guide will show you how to configure a Windows Mobile 5 PDA for Bluetooth connection to the KBM Systems OBDKey Bluetooth device.
This guide will show you how to configure a Windows Mobile 5 PDA for Bluetooth connection to the KBM Systems OBDKey Bluetooth device. You should first connect the OBDKey device to the vehicle and the vehicle
More informationIntroduction: Distributed Cyberphysical systems with Electricilty Networks as example (& Course Outline)
MasterClass on Data-driven Support for Cyberphysical systems DAT300, DIT615 Introduction: Distributed Cyberphysical systems with Electricilty Networks as example (& Course Outline) Networks and Systems
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationFast and Vulnerable A Story of Telematic Failures
Fast and Vulnerable A Story of Telematic Failures Center for Automotive Embedded Systems Security Ian Foster, Andrew Prudhomme, Karl Koscher, and Stefan Savage Telematic Control Units Connects to car s
More informationPatching Exploits with Duct Tape: Bypassing Mitigations and Backward Steps
SESSION ID: EXP-R01 Patching Exploits with Duct Tape: Bypassing Mitigations and Backward Steps James Lyne Global Head of Security Research Sophos / SANS Institute @jameslyne Stephen Sims Security Researcher
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationWireless Embedded Modules
Wireless Embedded Modules North American Sales Meeting July 2003 Product Overview Product Summary Embedded 802.11b wireless modules Ultra-compact, single component solutions Pin-compatible and interchangeable
More informationCode with red border means vulnerable code. Code with green border means corrected code. This program asks the user for a password with the function
1 Code with red border means vulnerable code. Code with green border means corrected code. This program asks the user for a password with the function IsPasswordOK(), and compares it with the correct password.
More informationSystems software. Definition. Categories of software. Examples Of Systems Software 11/23/2018
Systems Computer Software Is an interface or buffer between application and hardware Controls the computer hardware and acts as an interface with applications programs Definition A series of detailed instructions
More informationThe first Secure Programming Laboratory will be today! 3pm-6pm in Forrest Hill labs 1.B31, 1.B32.
Lab session this afternoon Memory corruption attacks Secure Programming Lecture 6: Memory Corruption IV (Countermeasures) David Aspinall, Informatics @ Edinburgh 2nd February 2016 The first Secure Programming
More informationBlack Hat Webcast Series. C/C++ AppSec in 2014
Black Hat Webcast Series C/C++ AppSec in 2014 Who Am I Chris Rohlf Leaf SR (Security Research) - Founder / Consultant BlackHat Speaker { 2009, 2011, 2012 } BlackHat Review Board Member http://leafsr.com
More informationSmart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017
Smart Antennas and : Enabling Secure Convergence July 5, 2017 About OpenSynergy OpenSynergy develops software solutions for embedded automotive systems. OpenSynergy s product portfolio includes key software
More informationAUTOBEST: A microkernel-based system (not only) for automotive applications. Marc Bommert, Alexander Züpke, Robert Kaiser.
AUTOBEST: A microkernel-based system (not only) for automotive applications Marc Bommert, Alexander Züpke, Robert Kaiser vorname.name@hs-rm.de Outline Motivation AUTOSAR ARINC 653 AUTOBEST Architecture
More informationAdvanced Diploma on Information Security
Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic
More informationSecure Programming Lecture 6: Memory Corruption IV (Countermeasures)
Secure Programming Lecture 6: Memory Corruption IV (Countermeasures) David Aspinall, Informatics @ Edinburgh 2nd February 2016 Outline Announcement Recap Containment and curtailment Tamper detection Memory
More informationWHITE PAPER Secure Firmware Upgrade System. June 2014
WHITE PAPER Secure Firmware Upgrade System June 2014 TABLE OF CONTENTS Abstract... 3 Why Secure Firmware Upgrade?... 3 Requirements of a Firmware Upgrade System... 4 Secure Firmware Upgrade Process...
More informationMy Personal Flasher (MPF) - User Guide for Android
My Personal Flasher (MPF) - User Guide for Android Table of Contents Connection to Android... 2 Droid Personal Flasher Use... 5 Dealer update... 7 1 Connection to Android Pre-Requisites: You MUST have
More informationThe Future of Smart Cards: Bigger, Faster and More Secure
The Future of Smart Cards: Bigger, Faster and More Secure Joerg Borchert, Vice President, Secure Mobile Solutions July 16, 2003 Page 1 N e v e r s t o p t h i n k i n g. Infineon Technologies: Overview
More informationINFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD
Faculty of Computer Science Institute of Systems Architecture, Operating Systems Group INFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD OVERVIEW Fundamental
More informationSoftware Vulnerabilities August 31, 2011 / CS261 Computer Security
Software Vulnerabilities August 31, 2011 / CS261 Computer Security Software Vulnerabilities...1 Review paper discussion...2 Trampolining...2 Heap smashing...2 malloc/free...2 Double freeing...4 Defenses...5
More informationIntegrating Custom Hardware into Sensor Web. Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic
Integrating Custom Hardware into Sensor Web Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic OUTLINE 1. Introduction 2. State of the art 3. System architecture - main components 3.1 Hardware
More informationCS 356 Operating System Security. Fall 2013
CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database
More informationUndermining Information Hiding (And What to do About it)
Undermining Information Hiding (And What to do About it) Enes Göktaş, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos Overview Mitigating
More informationUser. Applications. Operating System. Hardware
2 User Applications Operating System Hardware 3 What is the Booting 1.When the user powers up the computer the CPU (Central Processing Unit) activates the BIOS (Basic Input Output System). 2. The first
More informationAzure Sphere Transformation. Patrick Ward, Principal Solutions Specialist
Azure Sphere Transformation Patrick Ward, Principal Solutions Specialist IoT @_pdubya pward@microsoft.com Microcontrollers (MCUs) LOW-COST, SINGLE CHIP COMPUTERS TMS1100: 300 KHz core, 2KB ROM, 64B RAM,
More informationDefinition. A series of detailed instructions that control the operation of a computer system. are developed by computer programmers
Computer Software Definition A series of detailed instructions that control the operation of a computer system. Software exists as programs that are developed by computer programmers Categories of software
More informationIntroduction to software exploitation ISSISP 2017
Introduction to software exploitation ISSISP 2017 1 VM https://drive.google.com/open?id=0b8bzf4ybu s1kltjsnlnwqjhss1e (sha1sum: 36c32a596bbc908729ea9333f3da10918e24d767) Login / pass: issisp / issisp 2
More informationAutomotive Anomaly Monitors and Threat Analysis in the Cloud
Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications
More informationLec 13: Linking and Memory. Kavita Bala CS 3410, Fall 2008 Computer Science Cornell University. Announcements
Lec 13: Linking and Memory Kavita Bala CS 3410, Fall 2008 Computer Science Cornell University PA 2 is out Due on Oct 22 nd Announcements Prelim Oct 23 rd, 7:30-9:30/10:00 All content up to Lecture on Oct
More informationCSC 591 Systems Attacks and Defenses Stack Canaries & ASLR
CSC 591 Systems Attacks and Defenses Stack Canaries & ASLR Alexandros Kapravelos akaprav@ncsu.edu How can we prevent a buffer overflow? Check bounds Programmer Language Stack canaries [...more ] Buffer
More informationCS 161 Computer Security
Wagner Spring 2014 CS 161 Computer Security Midterm 1 Print your name:, (last) (first) I am aware of the Berkeley Campus Code of Student Conduct and acknowledge that academic misconduct will be reported
More informationLessons learned from 2G,3G,4G what we need to fix in 5G ETSI Security Week G Security Adrian Dabrowski
Lessons learned from 2G,3G,4G what we need to fix in 5G ETSI Security Week 2017 5G Security Adrian Dabrowski adrian.dabrowski@tuwien.ac.at @atrox_at Co-Authors: David Rupprecht, Thorsten Holz, Edgar Weippl,
More informationString Oriented Programming Exploring Format String Attacks. Mathias Payer
String Oriented Programming Exploring Format String Attacks Mathias Payer Motivation Additional protection mechanisms prevent many existing attack vectors Format string exploits are often overlooked Drawback:
More informationSPBT3.0DPx BT module. Firmware Update Procedure. Revision 1.0
SPBT3.0DPx BT module Firmware Update Procedure Revision 1.0 Agenda 2 Introduction Frequently Asked Questions Procedure Overview Hardware Setup Software Setup Introduction 3 Why ST customers should take
More informationAutonomous Driving From Fail-Safe to Fail-Operational Systems
Autonomous Driving From Fail-Safe to Fail-Operational Systems Rudolf Grave December 3, 2015 Agenda About EB Automotive Autonomous Driving Requirements for a future car infrastructure Concepts for fail-operational
More informationSoftware Security: Buffer Overflow Defenses
CSE 484 / CSE M 584: Computer Security and Privacy Software Security: Buffer Overflow Defenses Fall 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin,
More informationThis is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas.
Tú Teacher de Inglés 1 0B This is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas. Anti-virus software = - A program that finds
More informationSecuring the Connected Car. Eystein Stenberg Product Manager Mender.io
Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled
More informationKillTest 䊾 䞣 催 ࢭ ད ᅌ㖦䊛 ᅌ㖦䊛 NZZV ]]] QORRZKYZ TKZ ϔᑈܡ䊏 ᮄ ࢭ
KillTest Exam : 642-631 Title : Advanced Wireless LAN for Field Engineers Version : Demo 1 / 6 1.Which service component in the wireless operate phase helps isolate and resolve an incident? A. Change Management
More informationSecurity Concerns in Automotive Systems. James Martin
Security Concerns in Automotive Systems James Martin Main Questions 1. What sort of security vulnerabilities do modern cars face today? 2. To what extent are external attacks possible and practical? Background
More informationProgramming Languages for High-Assurance Autonomous Vehicles
Programming Languages for High-Assurance Autonomous Vehicles Lee Pike (speaker), Pat Hickey, James Bielman, Trevor Elliott, John Launchbury, Erlend Hamberg, Thomas DuBuisson S5 June 2014 Embedded Security:
More informationResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security
More informationDiagnostic Trends 2017 An Overview
Diagnostic Trends 2017 An Overview Vector India Conference, 2017-07-18+19 V1.0 2017-07-14 Agenda 1. DoIP 2. Remote Diagnostics 3. Cyber Security 4. Summary 2/29 DoIP Why DoIP? Why another diagnostic network?
More informationNew STM32WB Series MCU with Built-in BLE 5 and IEEE
New STM32WB Series MCU with Built-in BLE 5 and IEEE 802.15.4 Make the Choice of STM32WB Series The 7 keys points to make the difference 2 Open 2.4 GHz radio Multi-protocol Dual-core / Full control Ultra-low-power
More informationSecurity of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices
Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices Dr. Johann Heyszl, Head of Hardware Security Department Fraunhofer-Institute for Applied and Integrated Security
More informationARROW ARIS EDGE Board Software User s Guide 12/05/2017
ARROW ARIS EDGE Board Software User s Guide All information contained in these materials, including products and product specifications, represents information on the product at the time of publication
More informationKeyCarbon Raptor Laptop Keystroke Recorder
User s guide KeyCarbon Raptor Laptop Keystroke Recorder Products: KLAP601, KLAP602, KLAP613 BitForensics PC Security Devices TRADEMARKS Copyright BitForensics, Inc., 2000-2007. All rights reserved. Linux
More informationProduct Specification
Product Specification 15mm x 27mm Description One of the most capable Bluetooth modules available, the BT-21 Bluetooth OEM Module is designed for maximum flexibility. The BT-21 module includes 14 general
More informationCSCE 548 Building Secure Software Buffer Overflow. Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Buffer Overflow Professor Lisa Luo Spring 2018 Previous Class Virus vs. Worm vs. Trojan & Drive-by download Botnet & Rootkit Malware detection Scanner Polymorphic malware
More informationCSE 127: Computer Security Control Flow Hijacking. Kirill Levchenko
CSE 127: Computer Security Control Flow Hijacking Kirill Levchenko October 17, 2017 Control Flow Hijacking Defenses Avoid unsafe functions Stack canary Separate control stack Address Space Layout Randomization
More informationCSE 127 Computer Security
CSE 127 Computer Security Alex Gantman, Spring 2018, Lecture 4 Low Level Software Security II: Format Strings, Shellcode, & Stack Protection Review Function arguments and local variables are stored on
More informationConquering Complexity: Addressing Security Challenges of the Connected Vehicle
Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com
More information