skip to main content
10.1145/1352533.1352563acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Towards self-propagate mal-packets in sensor networks

Authors Info & Claims
Published:31 March 2008Publication History

ABSTRACT

Since sensor applications are implemented in embedded computer systems, cyber attacks that compromise regular computer systems via exploiting memory related vulnerabilities present similar threats to sensor networks. However, the paper shows that memory fault attacks in sensors are not just the same as in regular computers due to sensor's hardware and software architecture. In contrast to worm attacks, mal-codes carried by exploiting packets cannot be executed in a sensor. Therefore, the paper proposes a range of attack approaches to illustrate that a mal-packet, which only carries specially crafted data, can exploit memory-related vulnerabilities and utilize existing application codes in a sensor to propagate itself without disrupting sensor's functionality. The paper shows that such a mal-packet can have as few as 17 bytes. A prototype of a 27-byte mal-packet has been implemented and tested in Mica2 sensors. Simulation shows that the propagation pattern of such a malpacket in a sensor network is very different from worm propagation. Malpackets can either quickly take over the whole network or hard to propagate under different traffic situations.

References

  1. Atmega128. http://atmel.com/dyn/products/product-card.asp?part-id=2018.Google ScholarGoogle Scholar
  2. Mantis. http://mantis.cs.colorado.edu/.Google ScholarGoogle Scholar
  3. nesc: A programming language for deeply networked systems. http://nescc.sourceforge.net/.Google ScholarGoogle Scholar
  4. Ti msp430. http://www.ti.com/msp430.Google ScholarGoogle Scholar
  5. Tinyos. http://www.tinyos.net.Google ScholarGoogle Scholar
  6. Aleph One. Smashing the stack for fun and profit. Phrack Magazine, http://www.phrack.org/phrack/49/P49-14, 1996.Google ScholarGoogle Scholar
  7. Anonymous. Once upon a free(). Phrack Magazine, http://www.phrack.org/phrack/57/p57-0x09, 2001.Google ScholarGoogle Scholar
  8. S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In USENIX Security Symposium, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Chen, J. Xu, E. Sezer, P. Gauriar, and R. Iyer. Non-control-data attacks are realistic threats. In USENIX Security, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In the 12th USENIX Security Symposium, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: end-to-end containment of internet worms. In SOSP, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Cowan, S. Beattie, J. Johansen, and P. Wagle. Pointguard: protecting pointers from buffer overflow vulnerabilities. In USENIX Security Symposium, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier,P. Wagle, and Q. Zhang. Automatic detection and prevention of buffer-overflow attacks. In USENIX Security Symposium, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Etoh and K. Yoda. Propolice: improved stack-smashing attack detection. IPSJ SIGNotes Computer SECurity, http://www.trl.ibm.com/projects/security/ssp, 2001.Google ScholarGoogle Scholar
  15. D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, 19, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Govindavajhala and A. W. Appel. Using memory errors to attack a virtual machine. In IEEE Symposium on Security and Privacy, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Q. Gu. Analysis of software vulnerability in sensor nodes. In Proceeding of International Conference on Security and Management, 2007.Google ScholarGoogle Scholar
  18. B. Jack. Exploiting embedded systems. Black Hat Europe, 2006.Google ScholarGoogle Scholar
  19. M. Kaempf. Vudo malloc tricks. Phrack Magazine, http://www.phrack.org/phrack/57/p57-0x08, 2001.Google ScholarGoogle Scholar
  20. V. Kiriansky, D. Bruening, and S. Amarasinghe. Secure execution via program shepherding. In USENIX Security Symposium, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating mimicry attacks using static binary analysis. In USENIX Security, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Kumar, E. Kohler, and M. Srivastava. Harbor: software-based memory protection for sensor nodes. In ACM IPSN, pages 340--349, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Linn and S. Debray. Obfuscation of executable code to improve resistance to static disassembly. In ACM CCS, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Nergal. The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine, http://www.phrack.org/phrack/58/p58-0x04, 2001.Google ScholarGoogle Scholar
  25. T. Newsham. Format string attacks. http://muse.linuxmafia.org/lost+found/format-stringattacks.pdf, 2001.Google ScholarGoogle Scholar
  26. PAX. Pax address space layout randomization (aslr). http://pax.grsecurity.net/docs/aslr.txt.Google ScholarGoogle Scholar
  27. J. Regehr, N. Cooprider, W. Archer, and E. Eide. Memory safety and untrusted extensions for tinyos. Technical report, University of Utah, 2006.Google ScholarGoogle Scholar
  28. H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address space randomization. In ACM CCS, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Smirnov and T. Chiueh. Dira: automatic detection, identification and repair of control-data attacks. In Network and Distributed System Security Symposium, 2005.Google ScholarGoogle Scholar
  30. S. Staniford, V. Paxson, and N. Weaver. How to own the Internet in your spare time. In the 11th USENIX Security Symposium, pages 149--167, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. P. Starzetz. Crc32 sshd vulnerability analysis. http://packetstormsecurity.org/0102exploits/ssh1.crc32.txt., 2001.Google ScholarGoogle Scholar
  32. Vendicator. Stackshield. http://www.angelfire.com/sk/stackshield.Google ScholarGoogle Scholar
  33. D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In NDSS, 2002.Google ScholarGoogle Scholar
  34. X. Wang, C.-C. Pan, P. Liu, and S. Zhu. Sigfree: A signature-free buffer overflow attack blocker. In USENIX Security, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. H. Xu, W. Du, and S. Chapin. Context sensitive anomaly monitoring of process control flow to detect mimicry attacks and impossible paths. In Symposium on Recent Advances in Intrusion Detection, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  36. C. Zou, W. Gong, and D. Towsley. Worm propagation modeling and analysis under dynamic quarantine defense. In the 2003 ACM workshop on Rapid Malcode, pages 51--60, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards self-propagate mal-packets in sensor networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WiSec '08: Proceedings of the first ACM conference on Wireless network security
        March 2008
        234 pages
        ISBN:9781595938145
        DOI:10.1145/1352533

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 31 March 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate98of338submissions,29%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader