Software Security: Vulnerabilities and Countermeasures for Two Attacker Models

被引:0
|
作者
Piessens, Frank [1 ]
Verbauwhede, Ingrid [2 ]
机构
[1] Katholieke Univ Leuven, iMinds DistriNet, Leuven, Belgium
[2] Katholieke Univ Leuven, iMinds COSIC, Leuven, Belgium
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
History has shown that attacks against network-connected software based systems are common and dangerous. An important fraction of these attacks exploit implementation details of the software based system. These attacks - sometimes called low-level attacks - rely on characteristics of the hardware, compiler or operating system used to execute software programs to make these programs misbehave, or to extract sensitive information from them. With the increased Internet-connectivity of embedded devices, including industrial control systems, sensors as well as consumer devices, there is a substantial risk that similar attacks will target these devices. This tutorial paper explains the vulnerabilities, attacks and countermeasures relevant for low-level software security. The paper discusses software security for two different attacker models: the classic model of an attacker that can only interact with the program by providing input and reading output, and the more recent and challenging model of an attacker that controls part of the execution platform on which the software runs, for instance because the attacker has compromised the operating system, or some of the libraries that the software under attack relies on.
引用
收藏
页码:990 / 999
页数:10
相关论文
共 50 条
  • [1] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [2] Wireless security: Vulnerabilities and countermeasures
    Johnson, DM
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 91 - 91
  • [3] Security Vulnerabilities and Countermeasures in MPSoCs
    Sant'Ana, Anderson Camargo
    Medina, Henrique
    Moraes, Fernando Gehm
    [J]. IEEE DESIGN & TEST, 2021, 38 (04) : 70 - 77
  • [4] Security Vulnerabilities of SGX and Countermeasures: A Survey
    Fei, Shufan
    Yan, Zheng
    Ding, Wenxiu
    Xie, Haomeng
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (06)
  • [5] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    [J]. INFORMATION AGE, 1989, 11 (04): : 205 - 210
  • [6] Security Vulnerabilities and Countermeasures of Smart Contracts: A Survey
    Sifra, Epherem Merete
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 512 - 515
  • [7] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [8] Labeling Software Security Vulnerabilities
    Bojanova, Irena
    Guerrerio, John J.
    [J]. IT PROFESSIONAL, 2023, 25 (05) : 64 - 70
  • [9] From Attacker Models to Reliable Security
    Mantel, Heiko
    [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 547 - 547
  • [10] Software security growth modeling: Examining vulnerabilities with reliability growth models
    Ozment, Andy
    [J]. Quality of Protection: Security Measurements and Metrics, 2006, : 25 - 36