检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA
机构地区:[1]School of Cyber Engineering,Xidian University,Xi'an 710071,China [2]School of Computer Science and Technology,Xidian University,Xi'an 710071,China [3]Department of Computer and Information Science,University of Oregon,Eugene 97403,USA
出 处:《Science China(Information Sciences)》2024年第6期395-413,共19页中国科学(信息科学)(英文版)
基 金:supported by Key Program of the National Natural Science Foundation of China(Grant No.62232013);Fundamental Research Funds for the Central Universities(Grant Nos.ZYTS23202,YJSJ23007);Major Research Plan of the National Natural Science Foundation of China(Grant No.92267204);National Natural Science Foundation of China(Grant No.62372350);Key Research and Development Program of Shaanxi(Grant No.2023-ZDLGY-52);Key R&D Program of Shandong Province,China(Grant No.2023CXPT056);Shenzhen Science and Technology Program(Grant No.CJGJZD20220517142005013)。
摘 要:Memory corruption attacks(MCAs)refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems,causing leakage of sensitive data or perturbations to ongoing processes.Unlike general-purpose systems,unmanned systems cannot deploy complete security protection schemes,due to their limitations in size,cost and performance.MCAs in unmanned systems are particularly difficult to defend against.Furthermore,MCAs have diverse and unpredictable attack interfaces in unmanned systems,severely impacting digital and physical sectors.In this paper,we first generalize,model and taxonomize MCAs found in unmanned systems currently,laying the foundation for designing a portable and general defense approach.According to different attack mechanisms,we found that MCAs are mainly categorized into two types—return2libc and return2shellcode.To tackle return2libc attacks,we model the erratic operation of unmanned systems with cycles and then propose a cycle-task-oriented memory protection(CToMP)approach to protect control flows from tampering.To defend against return2shellcode attacks,we introduce a secure process stack with a randomized memory address by leveraging the memory pool to prevent Shellcode from being executed.Moreover,we discuss the mechanism by which CTo MP resists the return-oriented programming(ROP)attack,a novel variant of return2libc attacks.Finally,we implement CTo MP on CUAV V5+with Ardupilot and Crazyflie.The evaluation and security analysis results demonstrate that the proposed approach CTo MP is resilient to various MCAs in unmanned systems with low footprints and system overhead.
关 键 词:unmanned system memory corruption attack memory protection system security randomized memory address
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.216.110.162