Visible to the public Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices

TitleIncremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices
Publication TypeConference Paper
Year of Publication2021
AuthorsAbdElaal, AbdElaziz Saad AbdElaziz, Lehniger, Kai, Langendorfer, Peter
Conference Name2021 5th Cyber Security in Networking Conference (CSNet)
Keywordsauthentication, codes, composability, Computer crime, Encryption, Generators, human factors, Incremental Code Update, Information Reuse, IoT, Power demand, pubcrawl, resilience, Resiliency, return oriented programming, Return Oriented Programming (ROP), return-oriented programming, rop attacks, Scalability, security
AbstractCode-reuse attacks pose a threat to embedded devices since they are able to defeat common security defenses such as non-executable stacks. To succeed in his code-reuse attack, the attacker has to gain knowledge of some or all of the instructions of the target firmware/software. In case of a bare-metal firmware that is protected from being dumped out of a device, it is hard to know the running instructions of the target firmware. This consequently makes code-reuse attacks more difficult to achieve. This paper shows how an attacker can gain knowledge of some of these instructions by sniffing the unencrypted incremental updates. These updates exist to reduce the radio reception power for resource-constrained devices. Based on the literature, these updates are checked against authentication and integrity, but they are sometimes sent unencrypted. Therefore, it will be demonstrated how a Return-Oriented Programming (ROP) attack can be accomplished using only the passively sniffed incremental updates. The generated updates of the R3diff and Delta Generator (DG) differencing algorithms will be under assessment. The evaluation reveals that both of them can be exploited by the attacker. It also shows that the DG generated updates leak more information than the R3diff generated updates. To defend against this attack, different countermeasures that consider different power consumption scenarios are proposed, but yet to be evaluated.
DOI10.1109/CSNet52717.2021.9614275
Citation Keyabdelaal_incremental_2021