Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Control Flow Integrity
biblio
Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return Addresses**Thanks to all the reviewers for their valuable comments. This research is supported by an Australian Research Council grant (DP180104069).
Submitted by aekwall on Mon, 05/03/2021 - 1:05pm
return oriented programming
Benchmark testing
Binary codes
composability
Control Flow Integrity
Human Factors
programming
pubcrawl
Resiliency
return-oriented programming
rop attacks
Runtime
Runtime Rerandomization
Scalability
shadow stack
biblio
CFI: Control Flow Integrity or Control Flow Interruption?
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
return oriented programming
malicious code injection
modern Code Reuse Attacks
Monitoring
object-oriented programming
Payloads
programming
pubcrawl
Resiliency
Libraries
return-oriented programming
Runtime
runtime attacks
runtime memory vulnerabilities
Scalability
security of data
target system
rop attacks
Jump-Oriented Programming
interrupt requests
Human Factors
famous attack paradigms
execution flow
data flow analysis
data execution prevention
corrupt code pointers
control-flow integrity
Control Flow Integrity
computer security
composability
CFI-based defenses
CFI solutions
C++ languages
biblio
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use
Submitted by grigby1 on Mon, 11/04/2019 - 12:34pm
ROP Defense
programming
pubcrawl
Randomization
Registers
resilience
return-oriented programming
return-oriented programming attack
rop attacks
OS
Scalability
security mechanisms
security of data
Software
software watermarking
Steganography
Watermarking
defense mechanisms
Compositionality
Resiliency
Benign Use of ROP
code integrity verification
code reuse attack
composability
computer security
Control Flow Integrity
Information Reuse and Security
extended ROP attack
frequency control
Human behavior
Human Factors
Layout
operating system
operating systems (computers)
biblio
PMU-extended Hardware ROP Attack Detection
Submitted by aekwall on Mon, 10/14/2019 - 10:19am
PMU-extended hardware ROP attack detection
software security
short instruction sequences
security of data
Scalability
rop attacks
return oriented programming
Resiliency
pubcrawl
object oriented security
performance monitoring unit
object-oriented programming
low-cost hardware ROP detection approach
Human behavior
data execution prevention mechanism
Control Flow Integrity
composability
arbitrary code execution
biblio
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace
Submitted by grigby1 on Fri, 09/28/2018 - 4:14pm
security
resilience
pubcrawl
composability
Scalability
Metrics
edge detection
Resiliency
Control Flow Integrity
Intel PT
return oriented programming
shadow stack
biblio
Watch Me, but Don'T Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations
Submitted by grigby1 on Tue, 02/06/2018 - 1:59pm
composability
Control Flow Integrity
deep learning
pubcrawl
Resiliency
side channel analysis
trusted platform modules
biblio
BlackBox: Lightweight Security Monitoring for COTS Binaries
Submitted by grigby1 on Thu, 05/18/2017 - 2:44pm
Binary Rewriting
composability
Control Flow Integrity
Dynamic Code Generation
Dynamical Systems
Metrics
network coding
Program Monitoring
pubcrawl
Resiliency
software security