Abstract
Embedded systems have a plethora of role in all spheres of life ranging from medical application to nuclear application to industrial applications. For rapid prototyping of designs, reconfigurable hardware like FPGA is the most preferred solution. Such designs often rely on an embedded processor in the FPGA—sometimes implemented as a soft configuration in FPGA fabric or hard-wired as the integrated circuit while still connected to the FPGA fabric. Typically, embedded systems are exposed to various types of attacks, of those major vulnerability is the buffer overflow attack on the processor used. The buffer overflow attack corrupts the return address of a function or process and subsequently changes the execution order. Our goal is to study the effect of buffer overflow attack in an embedded processor, demonstrate the attack on a full chain of embedded system and providing cost-effective mitigation solution to prevent this type of attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cowan C, Wagle F, et al (2000) Buffer overflows: attacks and defenses for the vulnerability of the decade. In DISCEX’00 Proceedings, IEEE, 2000
Synopsis Editorial Team. Prevention of buffer overflow attack. Synopsis Security Blog Post, 2017
Synopsys Editorial Team. How to detect, prevent, and mitigate buffer overflow attacks. Synopsis Security Blog Post
James CF, Vitaly O, Nish B (2005) Buffer overflow attacks: detect, exploit, prevent. Syngress. ISBN: 9780080488424
Paganini P (2017) Experts found a critical remote buffer overflow vulnerability in Skype. Security Affairs Web-Post
Duckett C (2014) Android SDK suffers from buffer overflow and lack of hardening. ZDNet newsletter
Intel Corporation. Processor architecture. White Paper, 2015
Using MicroC/OS-II RTOS with the Nios II Processor Tutorial, 2011
FreeBSD Developers’ Handbook. Buffer overflows, 2018
Nios II processor reference handbook. Intel Corporation, December 2010
Acknowledgements
The research work is funded by the DST for C3I center at Department of Computer Science, IIT Kanpur.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, C., Satish, S., Mitra, J., Shukla, S. (2019). Buffer Overflow Attack and Prevention for an FPGA-Based Soft-Processor System. In: Saini, H., Singh, R., Kumar, G., Rather, G., Santhi, K. (eds) Innovations in Electronics and Communication Engineering. Lecture Notes in Networks and Systems, vol 65. Springer, Singapore. https://doi.org/10.1007/978-981-13-3765-9_43
Download citation
DOI: https://doi.org/10.1007/978-981-13-3765-9_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3764-2
Online ISBN: 978-981-13-3765-9
eBook Packages: EngineeringEngineering (R0)