Half-blind attacks: mask ROM bootloaders are dangerous

  • Authors:
  • Travis Goodspeed;Aurélien Francillon

  • Affiliations:
  • -;INRIA Rhône-Alpes

  • Venue:
  • WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a non-invasive, half-blind firmware extraction technique that subverts a mask ROM boot-loader in order to recover the firmware of a microcontroller. A stack based buffer overflow is used to forcibly enter the bootloader. Further, a practical method of blind return-oriented programming is presented in which a gadget's entry point is brute forced, being unknown a priori. In this paper we show that when a software vulnerability has been found (e.g. by fuzzing), the attacker can locate by brute force the sequences of instructions, gadgets, required for bypassing the protections present in a bootloader. In a half-blind attack, the presence of a bootloader in mask ROM helps the attacker in that, while he must still discover blindly a vulnerability in unknown firmware and the appropriate gadgets, he knows the exact contents of the bootloader.