Skip to main content

Buffer Overflow Attack and Prevention for an FPGA-Based Soft-Processor System

  • Conference paper
  • First Online:
Innovations in Electronics and Communication Engineering

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 65))

Abstract

Embedded systems have a plethora of role in all spheres of life ranging from medical application to nuclear application to industrial applications. For rapid prototyping of designs, reconfigurable hardware like FPGA is the most preferred solution. Such designs often rely on an embedded processor in the FPGA—sometimes implemented as a soft configuration in FPGA fabric or hard-wired as the integrated circuit while still connected to the FPGA fabric. Typically, embedded systems are exposed to various types of attacks, of those major vulnerability is the buffer overflow attack on the processor used. The buffer overflow attack corrupts the return address of a function or process and subsequently changes the execution order. Our goal is to study the effect of buffer overflow attack in an embedded processor, demonstrate the attack on a full chain of embedded system and providing cost-effective mitigation solution to prevent this type of attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cowan C, Wagle F, et al (2000) Buffer overflows: attacks and defenses for the vulnerability of the decade. In DISCEX’00 Proceedings, IEEE, 2000

    Google Scholar 

  2. Synopsis Editorial Team. Prevention of buffer overflow attack. Synopsis Security Blog Post, 2017

    Google Scholar 

  3. Synopsys Editorial Team. How to detect, prevent, and mitigate buffer overflow attacks. Synopsis Security Blog Post

    Google Scholar 

  4. James CF, Vitaly O, Nish B (2005) Buffer overflow attacks: detect, exploit, prevent. Syngress. ISBN: 9780080488424

    Google Scholar 

  5. Paganini P (2017) Experts found a critical remote buffer overflow vulnerability in Skype. Security Affairs Web-Post

    Google Scholar 

  6. Duckett C (2014) Android SDK suffers from buffer overflow and lack of hardening. ZDNet newsletter

    Google Scholar 

  7. Intel Corporation. Processor architecture. White Paper, 2015

    Google Scholar 

  8. Using MicroC/OS-II RTOS with the Nios II Processor Tutorial, 2011

    Google Scholar 

  9. FreeBSD Developers’ Handbook. Buffer overflows, 2018

    Google Scholar 

  10. Nios II processor reference handbook. Intel Corporation, December 2010

    Google Scholar 

Download references

Acknowledgements

The research work is funded by the DST for C3I center at Department of Computer Science, IIT Kanpur.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chamandeep Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, C., Satish, S., Mitra, J., Shukla, S. (2019). Buffer Overflow Attack and Prevention for an FPGA-Based Soft-Processor System. In: Saini, H., Singh, R., Kumar, G., Rather, G., Santhi, K. (eds) Innovations in Electronics and Communication Engineering. Lecture Notes in Networks and Systems, vol 65. Springer, Singapore. https://doi.org/10.1007/978-981-13-3765-9_43

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3765-9_43

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3764-2

  • Online ISBN: 978-981-13-3765-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics