z-logo
open-access-imgOpen Access
Function-oriented programming attacks on ARM Cortex-M processors
Author(s) -
Andre Cirne,
Patricia R. Sousa,
Luis Antunes,
Joao S. Resende
Publication year - 2025
Publication title -
ieee access
Language(s) - English
Resource type - Magazines
SCImago Journal Rank - 0.587
H-Index - 127
eISSN - 2169-3536
DOI - 10.1109/access.2025.3610033
Subject(s) - aerospace , bioengineering , communication, networking and broadcast technologies , components, circuits, devices and systems , computing and processing , engineered materials, dielectrics and plasmas , engineering profession , fields, waves and electromagnetics , general topics for engineers , geoscience , nuclear engineering , photonics and electrooptics , power, energy and industry applications , robotics and control systems , signal processing and analysis , transportation
In recent years, code-reuse attacks have been used to exploit software vulnerabilities and gain control in numerous software programs and embedded devices. Several measures have been put in place to prevent this type of attack, such as Control-Flow Integrity (CFI) systems, and some of these systems have already been integrated into hardware. Regardless, one attack persists, Function-Oriented Programming (FOP) attacks, a code-reuse attack in which a chain of functions is used to perform malicious actions. In this work, we perform the first analysis on the implications and feasibility of FOP attacks on microcontrollers, namely, on processors of the ARM Cortex-M family, that support PACBTI, a hardware feature for the implementation of CFI systems. During this process, we identified multiple dispatch gadgets in two common Real-time Operating System (RTOS). These gadgets were identified in the core features of the embedded Operating Systems (OSs), and therefore included in many operating systems. Furthermore, we also present CortexMFopper , a tool specially built to identify FOP gadgets in embedded devices as a way to raise awareness of this technique and was used for the identification of gadgets during this research.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom