ORSHIN Attack Defense Framework

Buffer overflow exploitation after fault injection

Description

Buffer overflow exploitation after fault injection

CWE

CVE

Attack Surfaces

Bootloader (MITRE EMB3D PID-21)

Debug Interface (MITRE EMB3D PID-15)

Attack Vectors

FI (MITRE EMB3D TID-110)

Instruction Skip

Control Flow Modification (MITRE EMB3D TID-105)

Defenses

Proper memory management, ASLR, Input validation, Bounds checking, Non-executable stack, Canaries

Code analysis, Manual, Static, Dynamic

Hardware fault tolerance, Spatial/temporal redundancy, Register ECC, Hardened PC, Hardened CSRs

Software implemented fault tolerance, Redundant execution, Control flow integrity enforcement

Fault injection testing, FI simulation, FI emulation, Software FI