Redirigiendo al acceso original de articulo en 20 segundos...
Inicio  /  Future Internet  /  Vol: 15 Par: 6 (2023)  /  Artículo
ARTÍCULO
TITULO

Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow

Kai Lehniger and Peter Langendörfer    

Resumen

With the increasing popularity of IoT (Internet-of-Things) devices, their security becomes an increasingly important issue. Buffer overflow vulnerabilities have been known for decades, but are still relevant, especially for embedded devices where certain security measures cannot be implemented due to hardware restrictions or simply due to their impact on performance. Therefore, many buffer overflow detection mechanisms check for overflows only before critical data are used. All data that an attacker could use for his own purposes can be considered critical. It is, therefore, essential that all critical data are checked between writing a buffer and its usage. This paper presents a vulnerability of the ESP32 microcontroller, used in millions of IoT devices, that is based on a pointer that is not protected by classic buffer overflow detection mechanisms such as Stack Canaries or Shadow Stacks. This paper discusses the implications of vulnerability and presents mitigation techniques, including a patch, that fixes the vulnerability. The overhead of the patch is evaluated using simulation as well as an ESP32-WROVER-E development board. We showed that, in the simulation with 32 general-purpose registers, the overhead for the CoreMark benchmark ranges between 0.1% and 0.4%. On the ESP32, which uses an Xtensa LX6 core with 64 general-purpose registers, the overhead went down to below 0.01%. A worst-case scenario, modeled by a synthetic benchmark, showed overheads up to 9.68%.

 Artículos similares

       
 
Panagiotis Kalaitzis, Michael Foumelis, Christos Vasilakos, Antonios Mouratidis and Nikolaos Soulakellis    
Surface motion is a complex, dynamic phenomenon that draws significant scientific attention. This study focuses on the development of a cartographic toolset for the visualization of space-borne Persistent Scatterer Interferometry (PSI) surface motion mea... ver más

 
Sara Palacios Chavarro, Pantaleone Nespoli, Daniel Díaz-López and Yury Niño Roa    
Software is behind the technological solutions that deliver many services to our society, which means that software security should not be considered a desirable feature anymore but more of a necessity. Protection of software is an endless labor that inc... ver más

 
Mircea Constantin ?cheau, Monica Violeta Achim, Larisa Gabudeanu, Viorela Ligia Vaidean, Alexandru Lucian Vîlcea and Liliana Apetri    
Drones have been included in more and more activities in various domains, such as military, commercial and personal use. The existing legislative framework insufficiently addresses the responsibility and preventive measures angles in case of vulnerabilit... ver más
Revista: Drones

 
Luofan Li, Xinju Li, Beibei Niu and Zixuan Zhang    
The Yellow River Delta region is one of the estuarine deltas with the fastest land building speed, and it is an important region for the study of landscape pattern change due to its diverse variety of landscape types. By analyzing the dynamic degree, lan... ver más
Revista: Water

 
Fan Huang, Haiping Zhang, Qiaofeng Wu, Shanqing Chi and Mingqing Yang    
The proper dispatching of hydraulic structures in water diversion projects is a desirable way to maximize project benefits. This study aims to provide a reliable, optimal scheduling model for hydraulic engineering to improve the regional water environmen... ver más
Revista: Water