Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
code reuse attack
biblio
Evaluating Software Diversity Based on Gadget Feature Analysis
Submitted by grigby1 on Fri, 09/01/2023 - 1:50pm
Software measurement
security gain
JavaScript engine
gadget feature
Information Reuse
codes
software diversity
Gain measurement
Compositionality
security
Diversity methods
code reuse attack
programming
composability
Software
Resiliency
resilience
pubcrawl
biblio
Research on Defending Code Reuse Attack Based on Binary Rewriting
Submitted by grigby1 on Fri, 09/01/2023 - 1:48pm
Compositionality
control-flow integrity
Symbols
Information Reuse
codes
software diversity
source coding
Aerospace electronics
Semantics
security
Layout
code reuse attack
Runtime
composability
Resiliency
resilience
pubcrawl
biblio
HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers
Submitted by aekwall on Fri, 02/17/2023 - 9:41am
Prototypes
TrustZone
Randomization
microcontroller security
code reuse attack
rop attacks
microcontrollers
Runtime environment
codes
security
Proposals
composability
Resiliency
Scalability
pubcrawl
Human Factors
embedded systems
biblio
An Approach of Code Pointer Hiding Based on a Resilient Area
Submitted by grigby1 on Mon, 03/23/2020 - 2:58pm
Information systems
source code (software)
Software
security of data
security
Scalability
rop attacks
resilient area
resilience
pubcrawl
pointer hiding
Payloads
memory disclosure vulnerability
Layout
Information Reuse and Security
information system security
Human Factors
Human behavior
flow graphs
Diversity methods
composability
code reuse attack
code reuse
code randomization
code pointer hiding
attack scenario
Resiliency
Compositionality
biblio
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use
Submitted by grigby1 on Mon, 11/04/2019 - 11:34am
ROP Defense
programming
pubcrawl
Randomization
Registers
resilience
return-oriented programming
return-oriented programming attack
rop attacks
OS
Scalability
security mechanisms
security of data
Software
software watermarking
Steganography
Watermarking
defense mechanisms
Compositionality
Resiliency
Benign Use of ROP
code integrity verification
code reuse attack
composability
computer security
Control Flow Integrity
Information Reuse and Security
extended ROP attack
frequency control
Human behavior
Human Factors
Layout
operating system
operating systems (computers)
biblio
Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
Resiliency
x64-based Linux platform
W ⊕ X security model
Task Analysis
security of data
security
scratch registers
scratch register
Scalability
ROP malicious code
rop attacks
ROP attack
Return-oriented Programming attacks
return oriented programming
return instructions
binary instrumentation
Registers
pubcrawl
programming
parameter registers
object-oriented programming
malware
Linux
Kernel
Instruction sets
Human behavior
composability
code reuse attack
calling convention
biblio
Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications
Submitted by aekwall on Mon, 10/14/2019 - 9:19am
privacy
FOP gadgets
function-oriented programming
Human behavior
JOP
Jump-Oriented Programming
Layout
Linux
Linux x64 environment
malicious program behavior
object oriented security
object-oriented programming
FOP attack
proftpd1.3.0 server
pubcrawl
return oriented programming
return-oriented programming
ROP
Scalability
security
security of data
Servers
shadow stack technology
tools
code reuse attack
Compositionality
Resiliency
address space layout randomization
ASLR
C Applications
C languages
C program
CFI
coarse-grained CFI
coarse-grained control-flow integrity
code injection attacks
Information Reuse and Security
code reuse attacks
composability
Conferences
Control-hijacking attacks
COOP
Counterfeit Object-oriented Programming
data-execution prevention
DEP
existing function
fine-grained CFI technologies
FOP
biblio
No-Execute-After-Read: Preventing Code Disclosure in Commodity Software
Submitted by grigby1 on Tue, 05/30/2017 - 12:12pm
memory protection key
windows operating systems security
Scalability
rop attacks
return oriented programming
Resiliency
pubcrawl
non-executable memory
Metrics
Browser Security
memory disclosure attack
memory disclosure
JIT ROP
import address table
fine grained randomization
composability
code reuse attack
biblio
Physical Unclonable Functions-based Linear Encryption Against Code Reuse Attacks
Submitted by grigby1 on Mon, 03/20/2017 - 9:46am
code reuse attack
command injection attacks
composability
encryption
injection
injection attacks
jump oriented programming
Metrics
physical unclonable functions
pubcrawl
Resiliency
return oriented programming
rop attacks
Scalability