Specifications

Print Controller Design Guide for Information Security:
Page 91 of 92
Protection Against Attacks on Principal MFP/LP Functions, Prevention of Damage to the System
Buffer Overflow Attacks on the MFP/LP VM
After completing the development of the SDK application, the Vendor must apply to Ricoh for the
items necessary to carry out the SDK Authentication and/or Digital Authentication processes
described above, and at that time declare the expected VM consumption of the application. The
proper method for measuring VM is described in the SDK Development Kit provided by Ricoh to
the Vendor. Ricoh then performs tests on the proposed application to verify that the actual VM
consumption matches that which the Vendor has stated on the application form, and then makes a
judgment as to whether or not to approve the application and provide the Vendor with the
requested authentication items.
Alteration or Deletion of MFP/LP Principal Function Program Objects
As mentioned above in section 3.1, each SDK application is installed in its own unique directory on
the HDD, which is determined by its unique product ID. It is impossible for the application to access
any other areas.
Even in the event that an SDK application attempted to write a large amount of data to the SD card
or MFP/LP HDD, e.g. with the aim of rendering machine principal functions unable to write data,
this would not succeed since the application cannot access any area aside of its own isolated
partition on the HDD. In addition, as a general rule, Ricoh prohibits SDK applications from writing to
any machine media or SD cards. Even in cases where Ricoh has given the application writing
capabilities upon request from the Vendor, the application is only able to write to a specialized SD
card for SDK applications.
Protection Against Attacks from External Sources
As mentioned in section 2.3, an SDK application is able to perform network communication either
by using the NCS (Type 1) or by opening and closing its own unique socket (Types 1 and 2). In the
latter case, all communication including the content of all messages and data exchanged is
encrypted, and specialized protocols and authentication procedures are employed. As a result,
these safeguards protect the MFP/LP from any attacks from external sources.