Free Essay

Security Exploitations of an Rtos

In:

Submitted By wsprat
Words 662
Pages 3
Running head: SECURITY EXPLOITATIONS OF REAL TIME OPERATING SYSTEMS 1

Security Exploitations of Real Time Operating Systems in Embedded Systems

Welton N. Spratley

Southern New Hampshire University

Running head: SECURITY EXPLOITATIONS OF REAL TIME OPERATING SYSTEMS 2

Security Exploitations of Real Time Operating Systems in Embedded Systems
Abstract:
Real Time Operating Systems that are currently used in embedded systems around the global community has seen an increase in the number of devices that are being employed using this technology. With the implementation of IPv6 , the number of IP addresses that are now available in order to support this boom in the use of embedded systems have also seen an increase in the types of operating systems that helps to manage these systems. However, this has created another area where malicious attackers can exploit some of the security flaws that can be found in these embedded systems. This research paper will outline how microkernels and monolithic kernels that are found in these real time operating systems have been exploited due to careless source code programming in their stack and heap memory areas. Some of these flaws can lead to buffer overflow of memory core areas which can lead to memory being overwritten and being replaced with other I/O or buffer underflow of memory which can lead to memory leakage. Disaster happens when an operating system fails to prevent the unauthorized usage of resources in relation to embedded systems.

Keywords: RTOS security; microkernel; memory management; stack; heap; interrupts, embedded system

Running head: SECURITY EXPLOITATIONS OF REAL TIME OPERATING SYSTEMS 3
Security Exploitations of Real Time Operating Systems in Embedded Systems
Introduction:
Real Time Operating Systems or RTOS plays a central role in managing and controlling embedded systems. The primary role of an operating system is an important piece of software which helps to control the resources in their operational domain. The kernel is the main workhorse that helps to facilitate the operating system’s ability to manage the many different type of requests to use certain hardware resources such as CPU time, memory allocations, hard drive usage, etc. Although an RTOS have the same abilities as general purpose OS’s, their main constraint is with time. Time is the main variable that makes an embedded system function with efficiency since the processes and threads has to be performed in real time rather than ‘soft’ time. This can create complexities and exploits at the kernel level if a programmer isn’t careful when designing their source code to execute their programs. Security isn’t a new idea when it comes to operating systems. However, many of the embedded systems that the majority of people are trying to implement doesn’t have the same level of security certifications found in other operating systems. This has made embedded systems very attractive for hackers and other malicious attackers to exploit since an RTOS has to be very efficient when dealing with interrupts, semaphores, and signaling issues in executing their prescribed threads and processes. With the scheduling and memory-management framework, a programmer can design an application with various priority levels for threads to perform optimally in an embedded system while mitigating the vulnerabilities of flawed source codes.

Running head: SECURITY EXPLOITATIONS OF REAL TIME OPERATING SYSTEMS 4
Project Type of Paper: This paper will be an evaluation of the potential security flaws of an RTOS within an embedded system and will be organized as followed: Section 2 will provide some background and describe the inner-workings of an RTOS and its main focus on time restrictive constraints vs. time-delayed or soft constraints. Section 3 will describe and analyze how memory management works with an embedded system and the different applications used. Section 4 will investigate the security difficulties of securing RTOS vulnerabilities against attacker and hackers. Section 5 will give an impact assessment of the research paper and Section 6 will conclude the research paper by giving it a comprehensive outlook where future research in this area is headed towards.

Similar Documents

Free Essay

Road to Serfdom

...The Reader’s Digest condensed version of The Road to Serfdom The Road to Serfdom FRIEDRICH A. HAYEK The condensed version of The Road to Serfdom by F. A. Hayek as it appeared in the April 1945 edition of Reader’s Digest The Institute of Economic Affairs First published in Great Britain in 1999 in the ‘Rediscovered Riches’ series by The Institute of Economic Affairs 2 Lord North Street Westminster London sw1p 3lb Reissued in the ‘Occasional Paper’ series in 2001 This condensed version of The Road to Serfdom © Reader’s Digest, reproduced by kind permission The Road to Serfdom is published in all territories outside the USA by Routledge. This version is published by kind permission. All other material copyright © The Institute of Economic Affairs 1999, 2001 Every effort has been made to contact the copyright holders associated with this edition. In some cases this has not been possible. The IEA will be pleased to include any corrections in the next edition. All rights reserved. Without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of both the copyright owner and the publisher of this book. A CIP catalogue record for this book is available from the British Library. isbn 0 255 36530 6 Many IEA publications are translated into...

Words: 16475 - Pages: 66

Free Essay

Researh Paper

...embedded in a highly heterogeneous and ever-changing usage environment. It combines the functional complexity of the wireless cellular paradigm with the protocol dynamics of TCP=IP networks. Understanding such an environment is more urgent and at the same time more difficult than for legacy 2G networks. Continuous traffic monitoring by means of an advanced system, coupled with routine expert-driven traffic analysis, provides an in-depth understanding of the status and performances of the network as well as of the statistical behaviour of the user population. Such knowledge allows for a better engineering and operation practice of the whole network, and specifically the early detection of hidden risks and emerging troubles. Furthermore, the exploitation of certain TCP=IP dynamic behaviour, particularly the TCP control-loop, coupled with information extracted from the 3GPP layers, provides a cost-effective means to monitor the status of the whole network without requiring access to all network elements. In this article the main lessons are summarized learned from a two-year research activity on traffic monitoring and analysis on top of an operational 3G network. Keywords: traffic monitoring; traffic analysis; 3G; cellular networks; GPRS; UMTS Analyse und Monitoring von Datenverkehr in 3G Netzwerken: ein Erfahrungsbericht aus dem METAWIN-Projekt. Ein 3G-Mobilfunknetz stellt ein extrem komplexes Gebilde dar, das in ein stark heterogenes und standig wechselndes Umfeld...

Words: 7609 - Pages: 31

Free Essay

Business and University Collaboration

...A Review of Business–University Collaboration      Professor Sir Tim Wilson DL  February 2012      Preface  Just as castles provided the source of strength for medieval towns, and factories provided prosperity  in the industrial age, universities are the source of strength in the knowledge‐based economy of the  twenty‐first century.            Lord Dearing, September 2002  The words of Lord Dearing continue to ring true. The economic and social prosperity of the UK  depends upon a healthy knowledge‐based economy. In our globally competitive economic  environment, never before has there been a greater need for a talented, enterprising workforce, for  constant innovation in product and service development, for a thriving culture of entrepreneurship,  for dynamic leading‐edge scientific and technological development and for world‐class research that  attracts investment.  In collaboration with business, and with the support of government, the UK  university sector has the capability to fulfil Lord Dearing’s vision: to be the source of strength in the  UK’s knowledge based economy of the twenty first century.     Universities are an integral part of the skills and innovation supply chain to business. However, this  supply chain is not a simple linear supplier‐purchaser transaction; it is not the acquisition of a single  product or service. This supply chain is multi‐dimensional, it has to be sustainable, and it has to have  quality, strength and resilience. These attributes can only be secured through close collaboration...

Words: 43625 - Pages: 175

Premium Essay

Information and Survey Analysis

...1. An IS auditor is reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of: A. variable sampling. B. substantive testing. C. compliance testing. D. stop-or-go sampling. The correct answer is: C. compliance testing. Explanation: Compliance testing determines whether controls are being applied in compliance with policy. This includes tests to determine whether new accounts were appropriately authorized. Variable sampling is used to estimate numerical values, such as dollar values. Substantive testing substantiates the integrity of actual processing, such as balances on financial statements. The development of substantive tests is often dependent on the outcome of compliance tests. If compliance tests indicate that there are adequate internal controls, then substantive tests can be minimized. Stop-or-go sampling allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed. 2. The decisions and actions of an IS auditor are MOST likely to affect which of the following risks? A. Inherent B. Detection C. Control D. Business The correct answer is: B. Detection Explanation: Detection risks are directly affected by the auditor's selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks are controlled by the actions of the company's management. Business...

Words: 97238 - Pages: 389

Premium Essay

Windows Fundamentals

...CompTIA SY0-301 CompTIA Security+ Version: 20.2 QUESTION NO: 1 A password history value of three means which of the following? A. Three different passwords are used before one can be reused. B. A password cannot be reused once changed for three years. C. After three hours a password must be re-entered to continue. D. The server stores passwords in the database for three days. Answer: A Explanation: QUESTION NO: 2 In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO). A. Subnetting B. NAT C. Firewall D. NAC E. VPN Answer: C,E Explanation: QUESTION NO: 3 Which of the following is the BEST approach to perform risk mitigation of user access control rights? A. Conduct surveys and rank the results. B. Perform routine user permission reviews. C. Implement periodic vulnerability scanning. D. Disable user accounts that have not been used within the last two weeks. Answer: B Explanation: 2 QUESTION NO: 4 Which of the following devices is BEST suited for servers that need to store private keys? A. Hardware security module B. Hardened network firewall C. Solid state disk drive D. Hardened host firewall Answer: A Explanation: QUESTION NO: 5 All of the following are valid cryptographic hash functions...

Words: 14377 - Pages: 58

Free Essay

Mayerer Mura

...of women, children and aged is done by the Social Welfare and Nutritious Meal Programme Department through the Directorates of Social Welfare, Social Defence and the Integrated Child Development Services Scheme. This Department also functions as a nodal agency for various Social Security Programmes implemented through the Revenue Department. 2.The Directorate of Social Welfare implements a number of programmes for the welfare of women including the Marriage Assistance Schemes. The Directorate also runs Service Homes where the destitute and deserted women can stay with security and at the same time, pursue education and vocational training. Working Women‟s Hostels where women can stay at affordable rates are also run by the Directorate of Social Welfare. Training and self-employment of women are thrust areas and the large number of Women Co-operative Societies run by the Directorate provide avenues for women to be self-reliant. The welfare of the vulnerable group of transgenders and programmes specially designed for them are also under the purview of the Directorate of Social Welfare. 3. Two flagship schemes of the Social Welfare and Nutritious Meal Programme Department relate to nutrition security for children. Puratchi Thalaivar MGR Nutritious Meal Programme provides hot cooked meal to 54.80 lakh school children from Standard I to X. The Integrated Child Development Services Scheme which is implemented by the Commissioner of Integrated Child Development Services Scheme, is...

Words: 24068 - Pages: 97

Free Essay

Idrivesa

...2007-2008 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, HYDERABAD B.TECH. ELECTRONICS AND COMMUNICATION ENGINEERING I YEAR COURSE STRUCTURE |Code |Subject |T |P/D |C | | |English |2+1 |- |4 | | |Mathematics - I |3+1 |- |6 | | |Mathematical Methods |3+1 |- |6 | | |Applied Physics |2+1 |- |4 | | |C Programming and Data Structures |3+1 |- |6 | | |Network Analysis |2+1 |- |4 | | |Electronic Devices and Circuits |3+1 |- |6 | | |Engineering Drawing |- |3 |4 | | |Computer Programming Lab. |- |3 |4 | | |IT Workshop |- |3 |4 | | |Electronic Devices and Circuits Lab |- |3...

Words: 26947 - Pages: 108

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919

Premium Essay

Computer Engineer

...* CCNA Routing & Switching 200-120 * Chapter 1 – Understanding Networks and their Building Blocks * 1-1 Introduction to Networks * 1-2 Networking Types * 1-3 OSI Reference Model * 1-4 TCP/IP Model * 1-5 Ethernet Technologies and Cabling * 1-6 Cisco 3 Layer Model * 1-7 Summary * Chapter 2 – IP Addressing and Subnets * 2-1 IP Addresses – Composition, Types and Classes * 2-2 Private and Public IP addresses * 2-3 Subnetting * 2-4 Variable Length Subnet Masks (VLSM) * 2-5 Route Summarization * 2-6 Troubleshooting IP Addressing * Chapter 3 Introduction to Cisco Routers, Switches and IOS * 3-1 Introduction to Cisco Routers, Switches, IOS & the Boot Process * 3-2 Using the Command-Line Interface (CLI) * 3-3 Basic Configuration of Router and Switches * 3-4 Configuring Router Interfaces * 3-5 Gathering Information and Verifying Configuration * 3-6 Configuring DNS & DHCP * 3-7 Saving, Erasing, Restoring and Backing up Configuration & IOS File * 3-8 Password Recovery on a Cisco Router * 3-9 Cisco Discovery Protocol (CDP) * 3-10 Using Telnet on IOS * 3-11 CCNA Lab #1 * Chapter 4 Introduction to IP Routing * 4-1 Understanding IP Routing * 4-2 Static, Default and Dynamic Routing * 4-3 Administrative Distance and Routing...

Words: 95744 - Pages: 383

Free Essay

Management

...Beginning a Life in Australia Welcome to Australia English DIAC12/01138.11 The Beginning a Life in Australia booklet is produced by the Department of Immigration and Citizenship (DIAC) and is published online at www.immi.gov.au/living-in-australia/settle-in-australia/beginning-life It is recommended that you view the booklet on a computer as it contains links to many websites that provide additional information. The booklet is reviewed and released annually and is available in PDF format. If you would like to provide comments or suggestions about the Beginning a Life in Australia booklet you can complete the online feedback form on the department’s website at www.immi.gov.au/contacts/forms/services/services-form.htm Note: If you wish to speak to a government department or non-government organisation and you need the assistance of an interpreter, ring the Translating and Interpreting Service (TIS National) on 13 1450 during business hours, which are generally 9.00 am to 5.00 pm. Ask TIS National to set up a three-way conversation between you, one of their interpreters and the organisation you wish to speak with. See Chapter 2, Help with English for more information about TIS National. Telephone numbers: Telephone numbers beginning with 1800 are free calls if you ring from a private telephone and cost the same as a local call if you ring from a payphone. Numbers beginning with 13 or 1300 are charged at local call rates. Some 1300 and 1800 numbers can be used only from...

Words: 30477 - Pages: 122

Free Essay

Essay

...GENEROLO JONO ŽEMAIČIO LIETUVOS KARO AKADEMIJA Genovaitė LAUGALIENĖ Milda MIRONAITĖ MOKOMASIS ANGLŲ – LIETUVIŲ IR LIETUVIŲ – ANGLŲ KALBŲ KARYBOS ŽODYNAS Eksperimentinis leidinys Vilnius 2008 UDK 355(03)=20=882 La-458 Mokomąjį anglų – lietuvių ir lietuvių – anglų kalbų karybos žodyną parengė Generolo Jono Žemaičio Lietuvos karo akademijos Užsienio kalbų instituto direktorė Genovaitė Laugalienė ir Užsienio kalbų instituto Užsienio kalbų katedros lektorė Milda Mironaitė. Atsakingoji redaktorė Užsienio kalbų instituto Užsienio kalbų katedros lektorė Aušra Bučaitė. Recenzavo Generolo Jono Žemaičio Lietuvos karo akademijos viršininko pavaduotojas doc. dr. Pranas Jankauskas, Užsienio kalbų instituto Anglų kalbos mokymo centro viršininkas vyr. ltn. Andrius Kiesas ir Lietuvos kariuomenės Mokymo ir doktrinų valdybos Individualiojo rengimo skyriaus Anglų kalbos mokymo poskyrio vedėja Aušra Narbutienė. © Genovaitė Laugalienė, 2008 © Milda Mironaitė, 2008 © Generolo Jono Žemaičio Lietuvos karo akademija, 2008 Turinys Pratarmė......................................................................................................................... 4 . Angliški ir lietuviški sutrumpinimai ............................................................................ 5 Anglų – lietuvių kalbų karybos žodynas........................................................................ 7 Lietuvių – anglų kalbų karybos žodynas ....................................

Words: 111618 - Pages: 447

Premium Essay

It Notes for Business

...ADVANCED COMPUTER APPLICATIONS MODULE DEFINE A COMPUTER * An electronic machine that works under the control of stored programs to accept, process & output data/information for use by the operator. * A device that accepts data, processes the data in accordance with a stored program, generates results, and usually consists of input, output, storage, and arithmetic, logic, and control units. * A functional unit that can perform substantial computation, including numerous arithmetic operations or logic operations, without human intervention during a run. * It is an electronic device/machine that accepts data (raw facts & figures) as input and processes (works on it) to produce information (data converted to meaningful form) as output. The computer is made up of hardware, software and peripheral devices. Hardware- refers to the tangible, physical and mechanical components of a computer. Software- refers to the intangible computer components, which are the programs or instructions of the computer. Everything that a computer does, it acts under instructions written out as computer programs. The hardware needs these instructions to function Computer program: * A set of instructions, written in a specific programming language, which a computer follows in processing data, performing an operation, or solving a logical problem. See also software. * A computer program is a set of statements or instructions to be used directly or indirectly in a computer...

Words: 59334 - Pages: 238

Free Essay

Annual Report of Pakistan Textile Process Mill

...ACTIVITIES REPORT OF APTPMA HEAD OFFICE APTPMA Annual Report 2007-2008 1 SELECTED ACTIVITIES OF “APTPMA” HEAD OFFICE Dear Readers: We are giving hereunder brief excerpts of APTPMA activities for the year 2007-08 from APTPMA Head Office record for your kind perusal and ready reference: (ZAHIR IQBAL KHAWJA) Secretary APTPMA Head Office ******** ANNUAL ELECTIONS 2007-08 (Press Release Dated 01st January 2008): As per press release dated 01st January 2008, the Central Body elections of All Pakistan Textile Processing Mills Association (APTPMA) were announced by Mian Aftab Ahmed on behalf of Mian Shabbir Ahmed, Returning Officer for APTPMA Elections 200708. The elections were conducted as per directions and orders of the Director General Trade Organizations (DGTO) issued to all the Trade Bodies of Pakistan for the purpose. Following five (5) office-bearers were elected unopposed for the Central Body: Chairman: Mr. Muhammad Riaz Sheikh of M/s Riaz Fabrics, Lahore, Senior Vice Chairman: Mian Ajmal Farooq of M/s Noor Fatima Fabrics Faisalabad, Vice Chairman (Central) Faisalabad: Sheikh M.Amjad Javed of M/s Al-Hamra Textile Industries Faisalabad; Vice Chjairman (Central) Karachi: M.Altaf Shekhani of M/s Shekhani Industries Karachi; Vice Chairman (Central) Lahore/Gujranwala Region: Sheikh Ejaz Raza of M/s Rehman Dyeing, Gujranwala. Besides Central Body elections, the following Regional Chairmen, Regional Vice Chairmen and members Executive Committee were declared elected...

Words: 36115 - Pages: 145

Free Essay

Nit-Silchar B.Tech Syllabus

...NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR Bachelor of Technology Programmes amï´>r¶ JH$s g§ñWmZ, m¡Úmo{ à VO o pñ Vw dZ m dY r V ‘ ñ Syllabi and Regulations for Undergraduate PROGRAMME OF STUDY (wef 2012 entry batch) Ma {gb Course Structure for B.Tech (4years, 8 Semester Course) Civil Engineering ( to be applicable from 2012 entry batch onwards) Course No CH-1101 /PH-1101 EE-1101 MA-1101 CE-1101 HS-1101 CH-1111 /PH-1111 ME-1111 Course Name Semester-1 Chemistry/Physics Basic Electrical Engineering Mathematics-I Engineering Graphics Communication Skills Chemistry/Physics Laboratory Workshop Physical Training-I NCC/NSO/NSS L 3 3 3 1 3 0 0 0 0 13 T 1 0 1 0 0 0 0 0 0 2 1 1 1 1 0 0 0 0 4 1 1 0 0 0 0 0 0 2 0 0 0 0 P 0 0 0 3 0 2 3 2 2 8 0 0 0 0 0 2 2 2 2 0 0 0 0 0 2 2 2 6 0 0 8 2 C 8 6 8 5 6 2 3 0 0 38 8 8 8 8 6 2 0 0 40 8 8 6 6 6 2 2 2 40 6 6 8 2 Course No EC-1101 CS-1101 MA-1102 ME-1101 PH-1101/ CH-1101 CS-1111 EE-1111 PH-1111/ CH-1111 Course Name Semester-2 Basic Electronics Introduction to Computing Mathematics-II Engineering Mechanics Physics/Chemistry Computing Laboratory Electrical Science Laboratory Physics/Chemistry Laboratory Physical Training –II NCC/NSO/NSS Semester-4 Structural Analysis-I Hydraulics Environmental Engg-I Structural Design-I Managerial Economics Engg. Geology Laboratory Hydraulics Laboratory Physical Training-IV NCC/NSO/NSS Semester-6 Structural Design-II Structural Analysis-III Foundation Engineering Transportation Engineering-II Hydrology &Flood...

Words: 126345 - Pages: 506