Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

data execution prevention

biblio

Visible to the public CFI: Control Flow Integrity or Control Flow Interruption?

Submitted by aekwall on Mon, 02/24/2020 - 11:01am
  • return oriented programming
  • malicious code injection
  • modern Code Reuse Attacks
  • Monitoring
  • object-oriented programming
  • Payloads
  • programming
  • pubcrawl
  • Resiliency
  • Libraries
  • return-oriented programming
  • Runtime
  • runtime attacks
  • runtime memory vulnerabilities
  • Scalability
  • security of data
  • target system
  • rop attacks
  • Jump-Oriented Programming
  • interrupt requests
  • Human Factors
  • famous attack paradigms
  • execution flow
  • data flow analysis
  • data execution prevention
  • corrupt code pointers
  • control-flow integrity
  • Control Flow Integrity
  • computer security
  • composability
  • CFI-based defenses
  • CFI solutions
  • C++ languages
biblio

Visible to the public Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks

Submitted by BrandonB on Thu, 04/30/2015 - 2:10pm
  • hackers
  • translation lookahead buffers monitoring
  • TLB
  • system monitoring
  • security
  • memory pages identification
  • legitimate code injection attack
  • invasive software
  • Handheld computers
  • blocks malicious injected code activation
  • external I/O operations
  • Decision support systems
  • data execution prevention
  • Computer crime
  • code injection attack detection
  • Code injection
  • Buffer storage

Terms of Use  |  ©2023. CPS-VO