Share Email Print
cover

Proceedings Paper • new

Compromising an IoT device based on Harvard architecture microcontroller
Author(s): Krzysztof Cabaj; Grzegorz Mazur; Mateusz Nosek
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

The paper describes the concept and implementation of an attack technique, targeting an Internet-connected device based on Arduino family board and modules with an ATmega microcontoller. Due to Harvard-like architecture of the microcontroller, the attack uses return-oriented programming principle, utilizing the pieces of firmware already contained in the memory of target device. We show that the routines present in the device are sufficient to convey a successful attack and change the device operation in the presence of buffer overflow backdoor to the firmware.

Paper Details

Date Published: 1 October 2018
PDF: 10 pages
Proc. SPIE 10808, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2018, 108082G (1 October 2018); doi: 10.1117/12.2501580
Show Author Affiliations
Krzysztof Cabaj, Warsaw Univ. of Technology (Poland)
Grzegorz Mazur, Warsaw Univ. of Technology (Poland)
Mateusz Nosek, Warsaw Univ. of Technology (Poland)


Published in SPIE Proceedings Vol. 10808:
Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2018
Ryszard S. Romaniuk; Maciej Linczuk, Editor(s)

© SPIE. Terms of Use
Back to Top