このエントリーをはてなブックマークに追加
ID 69513
FullText URL
fulltext.pdf 1.15 MB
Author
Saji, Kazuma Graduate School of Environmental, Life, Natural Science and Technology, Okayama University
Yamauchi, Toshihiro Faculty of Environmental, Life, Natural Science and Technology, Okayama University ORCID Kaken ID publons researchmap
Kobayashi, Satoru Faculty of Environmental, Life, Natural Science and Technology, Okayama University
Taniguchi, Hideo Graduate School of Environmental, Life, Natural Science and Technology, Okayama University Kaken ID publons researchmap
Abstract
Most Internet of Things (IoT) devices currently in use are vulnerable to code reuse attacks because manufacturers typically deploy the same firmware across all devices. This uniformity enables attackers to craft a single exploit that can compromise multiple devices. To mitigate this risk, we propose a firmware diversification approach that creates multiple executable files with varying software compositions. Our approach introduces two complementary techniques: Function Address Reordering (FAR), which randomizes the order of functions within object files during compilation, and Object Address Reordering (OAR), which permutes the linking order of object files in the final executable. These techniques collectively diversify firmware instances without altering runtime behavior, making executing code reuse attacks significantly more difficult. By deploying firmware with diverse executable files, it is possible to enhance security without altering device behavior. We evaluate the effectiveness and limitations of the proposed methods when integrated into actual IoT firmware, assessing their resilience to code reuse attacks, impact on runtime behavior, and compilation overhead. Experimental results demonstrate that FAR and OAR significantly reduce the success rate of return-oriented programming attacks while incurring minimal performance overhead. This study offers a scalable, hardware-independent defense against code reuse attacks that increases resilience without a significant performance overhead, rendering it practical for widespread adoption in various IoT applications.
Keywords
Code reuse attack
IoT firmware
software diversity
function reordering
LLVM
Published Date
2025
Publication Title
IEEE Access
Volume
volume13
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Start Page
185111
End Page
185124
ISSN
2169-3536
Content Type
Journal Article
language
English
OAI-PMH Set
岡山大学
Copyright Holders
© 2025 The Authors.
File Version
publisher
DOI
Related Url
isVersionOf https://doi.org/10.1109/access.2025.3626065
License
https://creativecommons.org/licenses/by/4.0/
助成情報
23K24848: 機器毎のソフトウェア構成変更による攻撃難化と攻撃耐性を持つ基盤ソフトウェアの研究 ( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )
25K03119: 機密VM環境における機密情報の拡散追跡と証拠保全を実現する基盤ソフトウェアの研究 ( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )