Software Security: Vulnerabilities and Countermeasures for Two Attacker Models

被引:0
|
作者
Piessens, Frank [1 ]
Verbauwhede, Ingrid [2 ]
机构
[1] Katholieke Univ Leuven, iMinds DistriNet, Leuven, Belgium
[2] Katholieke Univ Leuven, iMinds COSIC, Leuven, Belgium
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
History has shown that attacks against network-connected software based systems are common and dangerous. An important fraction of these attacks exploit implementation details of the software based system. These attacks - sometimes called low-level attacks - rely on characteristics of the hardware, compiler or operating system used to execute software programs to make these programs misbehave, or to extract sensitive information from them. With the increased Internet-connectivity of embedded devices, including industrial control systems, sensors as well as consumer devices, there is a substantial risk that similar attacks will target these devices. This tutorial paper explains the vulnerabilities, attacks and countermeasures relevant for low-level software security. The paper discusses software security for two different attacker models: the classic model of an attacker that can only interact with the program by providing input and reading output, and the more recent and challenging model of an attacker that controls part of the execution platform on which the software runs, for instance because the attacker has compromised the operating system, or some of the libraries that the software under attack relies on.
引用
收藏
页码:990 / 999
页数:10
相关论文
共 50 条
  • [21] Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security
    Kumar, Naveen
    Chaudhary, Ankit
    [J]. COMPUTER NETWORKS, 2024, 252
  • [22] Experiments and countermeasures of security vulnerabilities on next generation network
    Kim, Jeong-Wook
    Cho, Hyug-Hyun
    Mun, Gil-Jong
    Seo, Jae-Hyun
    Noh, Bong-Nam
    Kim, Yong-Min
    [J]. PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 562 - +
  • [23] Software Metrics as Indicators of Security Vulnerabilities
    Medeiros, Nadia
    Ivaki, Naghmeh
    Costa, Pedro
    Vieira, Marco
    [J]. 2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, : 216 - 227
  • [24] The Research on Software Security Vulnerabilities Mining
    Liu Shuyu
    Kong Weiguang
    Yang Diwei
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT AND INNOVATION (TMI 2010), 2010, : 333 - 335
  • [25] On the Detection and Analysis of Software Security Vulnerabilities
    Wijesiriwardana, Chaman
    Wimalaratne, Prasad
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [26] Software Security Vulnerabilities: Baselining and Benchmarking
    Rotella, Pete
    [J]. 2018 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SECURITY AWARENESS FROM DESIGN TO DEPLOYMENT (SEAD), 2018, : 3 - 10
  • [27] Incorporating attacker behavior in stochastic models of security
    Sallhammar, K
    Helvik, BE
    Knapskog, SJ
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 79 - 85
  • [28] Software-defined networking security for private data center networks and clouds: Vulnerabilities, attacks, countermeasures, and solutions
    Abdelrahman, Abdallah Mustafa
    Rodrigues, Joel J. P. C.
    Mahmoud, Mukhtar M. E.
    Saleem, Kashif
    Das, Ashok Kumar
    Korotaev, Valery
    Kozlov, Sergei A.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (04)
  • [29] Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
    Islam, Shama Naz
    Baig, Zubair
    Zeadally, Sherali
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6522 - 6530
  • [30] Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study
    Dey, Vishal
    Pudi, Vikramkumar
    Chattopadhyay, Anupam
    Elovici, Yuval
    [J]. 2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 398 - 403