Translator Disclaimer
1 October 2018 Compromising an IoT device based on Harvard architecture microcontroller
Author Affiliations +
Proceedings Volume 10808, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2018; 108082G (2018) https://doi.org/10.1117/12.2501580
Event: Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2018, 2018, Wilga, Poland
Abstract
The paper describes the concept and implementation of an attack technique, targeting an Internet-connected device based on Arduino family board and modules with an ATmega microcontoller. Due to Harvard-like architecture of the microcontroller, the attack uses return-oriented programming principle, utilizing the pieces of firmware already contained in the memory of target device. We show that the routines present in the device are sufficient to convey a successful attack and change the device operation in the presence of buffer overflow backdoor to the firmware.
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Krzysztof Cabaj, Grzegorz Mazur, and Mateusz Nosek "Compromising an IoT device based on Harvard architecture microcontroller", Proc. SPIE 10808, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2018, 108082G (1 October 2018); https://doi.org/10.1117/12.2501580
PROCEEDINGS
10 PAGES


SHARE
Advertisement
Advertisement
Back to Top