Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE

TEE systems provide normal world and secure world. It is impossible to gain access to the secure world directly from the normal world. However, vulnerabilities in the secure world can cause attacks to compromise the secure world. In this study, we investigate the security features applied to trusted...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:International Symposium on Computing and Networking Workshops (Online) s. 274 - 278
Hlavní autoři: Shiba, Kaito, Kuzuno, Hiroki, Yamauchi, Toshihiro
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 27.11.2023
Témata:
ISSN:2832-1324
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:TEE systems provide normal world and secure world. It is impossible to gain access to the secure world directly from the normal world. However, vulnerabilities in the secure world can cause attacks to compromise the secure world. In this study, we investigate the security features applied to trusted applications (TA) in OP-TEE and clarify the lack of protection against stack buffer overflow in TA command calls. We also propose a method for preventing attacks that exploit stack buffer overflows in TA command calls. In addition, the experimental results show that attacks on the vulnerable TAs can be prevented with the proposed method and the overhead can be evaluated.
ISSN:2832-1324
DOI:10.1109/CANDARW60564.2023.00052