REDBOOK: Robust hardwarE-based Defences against Buffer Overflows and Other cybersecurity attacKs

From Navigators

(Difference between revisions)
Jump to: navigation, search
 
Line 3: Line 3:
|Title=Robust hardwarE-based Defences against Buffer Overflows and Other cybersecurity attacKs
|Title=Robust hardwarE-based Defences against Buffer Overflows and Other cybersecurity attacKs
|Past Project=no
|Past Project=no
-
|ResearchLine=Fault and Intrusion Tolerance in Open Distributed Systems (FIT)
+
|ResearchLine=Fault and Intrusion Tolerance in Open Distributed Systems (FIT), Timeliness and Adaptation in Dependable Systems (TADS)
|Sponsor=FCT
|Sponsor=FCT
|Project Number=PTDC/EEI-HAC/31273/2017
|Project Number=PTDC/EEI-HAC/31273/2017

Latest revision as of 17:52, 18 November 2021


For decades, numerous vulnerabilities have put computer systems and applications at risk. Several cybersecurity issues have been recurrent, being Buffer Overflows (BOs) vulnerabilities a primary attack method, which nowadays still accounts for more than 25% of the reported attacks. Such a high number clearly shows that classical software-based and compiler-assisted techniques for preventing exploitation of buffer overflow vulnerabilities did not succeed. Existing hardware-based methods (e.g., StackGhost) are too restricted and therefore they are not widely used. This project aims the design of an innovative hardware-based system monitoring architecture, introducing novel non-intrusive observation and runtime verification mechanisms for robust defence against cybersecurity hazards emerging either from accidental faults or from malicious attacks. Technical feasibility will be demonstrated for SPARC (aerospace applications) and ARM (telecommunications, including mobile) platforms.


BibTeX

Navigators - REDBOOK project
Personal tools
Navigators toolbox