...
首页> 外文期刊>Computers & Security >CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems
【24h】

CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems

机译:CIMA:对网络物理系统中的记忆安全攻击进行编译恢复性

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Memory-safety attacks have been one of the most critical threats against computing systems. Although a wide-range of defense techniques have been developed against these attacks, the existing mitigation strategies have several limitations. In particular, most of the existing mitigation approaches are based on aborting or restarting the victim program when a memory-safety attack is detected, thus making the system unavailable. This might not be acceptable in systems with stringent timing constraints, such as cyber-physical systems (CPS), since the system unavailability leaves the control system in an unsafe state. To address this problem, we propose CIMA - a resilient mitigation technique that prevents invalid memory accesses at runtime. CIMA manipulates the compiler-generated control-flow graph to automatically detect and bypass unsafe memory accesses at runtime, thereby mitigating memory-safety attacks along the process. An appealing feature of CIMA is that it significantly improves system availability and resilience of the CPS even under the presence of memory-safety attacks. To this end, we design our experimental setup based on a realistic Secure Water Treatment (SWaT) and Secure Urban Transportation System (SecUTS) testbeds and evaluate the effectiveness and the efficiency of our approach. The experimental results reveal that CIMA handles memory-safety attacks effectively while meeting the real-time constraints and physical-state resiliency of the CPS under test. Using CIMA, we have also discovered a memory-safety vulnerability in the firmware of programmable logic controllers and a CVE ID has already been assigned for it.
机译:内存安全攻击是对计算系统最关键的威胁之一。虽然已经针对这些攻击制定了广泛的防御技术,但现有的缓解策略有几个限制。特别地,大多数现有的缓解方法基于检测到内存安全攻击时中止或重新启动受害者程序,从而使系统无法使用。在具有严格定时约束的系统中可能无法接受,例如网络物理系统(CPS),因为系统不可用使控制系统以不安全状态离开。为了解决这个问题,我们提出了CIMA - 一种弹性缓解技术,可以防止运行时在运行时进行无效的内存访问。 CIMA操纵编译器生成的控制流程图,以在运行时自动检测和绕过不安全的内存访问,从而减轻该过程的内存安全攻击。 CIMA的吸引人特征是,即使在内存安全攻击的存在下,它也显着提高了CPS的系统可用性和抵御。为此,我们根据现实的安全水处理(SWAT)和安全的城市交通系统(SECUT)试验和评估我们方法的效率和效率,设计我们的实验设置。实验结果表明,CIMA在符合所测试的CPS的实时约束和物理状态弹性时有效地处理内存安全攻击。使用CIMA,我们还发现了可编程逻辑控制器固件中的内存安全漏洞,并且已经为其分配了CVE ID。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号