Shakedown: compiler-based moving target protection for Return Oriented Programing attacks on an industrial IoT device

Fady Copty,Francisco Hernandez,Dov Murik,Olmo Rayón
DOI: https://doi.org/10.48550/arXiv.1810.02090
2018-10-04
Cryptography and Security
Abstract:Cybercriminals use Return Oriented Programming techniques to attack systems and IoT devices. While defenses have been developed, not all of them are applicable to constrained devices. We present Shakedown, which is a compile-time randomizing build tool which creates several versions of the binary, each with a distinct memory layout. An attack developed against one device will not work on another device which has a different memory layout. We tested Shakedown on an industrial IoT device and shown that its normal functionality remained intact while an exploit was blocked.
What problem does this paper attempt to address?