Check out the new USENIX Web site. next up previous
Next: Recommendations Up: Malicious Actions Previous: Recommendations

Memory Corruption

Devices using Flash memory supporting field-upgradeable operating systems have inflection points that ROM-based devices do not. Malicious code is capable of taking advantage of the field-upgradeable capabilities of the Flash device to modify or destroy data. Through this, they can patch the operating system with custom code or completely overwrite it. [9,10] provides details of performing operating system upgrades in the Flash memory of Palm OS devices.

Successful attacks on Flash can be crippling for the Palm OS device. The critical boot loader functionality for controlling field-upgrades is often stored in Flash. If this area is not properly protected using the Software Protection and Boot-Block locking features provided by the Flash memory device, it can be altered. Complete erasure of the boot loader prevents field-reprogramming of the operating system and will require the device to be returned to the factory for replacement. Any data not stored in protected areas of Flash memory is subject to erasure or modification, often without detection.

Subsections

Kingpin
2001-05-09