Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
code reuse attacks
biblio
Software Reuse Exploits in Node.js Web Apps
Submitted by grigby1 on Mon, 06/06/2022 - 12:10pm
security
Servers
pubcrawl
Resiliency
Safety
Ecosystems
Manuals
data flow analysis
Compositionality
code injection attacks
code reuse attacks
Inspection
codes
application-level DoS
private data leaks
Information Reuse
biblio
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency
Submitted by aekwall on Thu, 04/08/2021 - 4:33pm
Proposals
testing
Semantics
semantic consistency
security
Scalability
rop attacks
Resiliency
pubcrawl
Prototypes
return oriented programming
Information Reuse and Security
Human Factors
Entropy
computer architecture
Compositionality
composability
code reuse attacks
code randomization
biblio
FIXER: Flow Integrity Extensions for Embedded RISC-V
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
integrated Rocket Custom Coprocessor
program compilers
security framework
RISC-V
buffer overflow
Code injection
coprocessors
fine-grained control-flow integrity
FIXER
flow integrity extensions for embedded RISC-V
return oriented programming
low-power embedded devices
open source architecture
RISC-V architecture
RISC-V processor core
RISC-V SoC platform
RISC-V toolchains
Rockets
security extension
shadow stack
Buffer overflows
Scalability
Internet of Things
data integrity
Hardware
security
embedded systems
reduced instruction set computing
system-on-chip
computer architecture
security of data
Resiliency
pubcrawl
composability
software reusability
Software Architecture
Bars
Human Factors
code reuse attacks
ROP
biblio
Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications
Submitted by aekwall on Mon, 10/14/2019 - 10:19am
privacy
FOP gadgets
function-oriented programming
Human behavior
JOP
Jump-Oriented Programming
Layout
Linux
Linux x64 environment
malicious program behavior
object oriented security
object-oriented programming
FOP attack
proftpd1.3.0 server
pubcrawl
return oriented programming
return-oriented programming
ROP
Scalability
security
security of data
Servers
shadow stack technology
tools
code reuse attack
Compositionality
Resiliency
address space layout randomization
ASLR
C Applications
C languages
C program
CFI
coarse-grained CFI
coarse-grained control-flow integrity
code injection attacks
Information Reuse and Security
code reuse attacks
composability
Conferences
Control-hijacking attacks
COOP
Counterfeit Object-oriented Programming
data-execution prevention
DEP
existing function
fine-grained CFI technologies
FOP
biblio
ROP Gadget Prevalence and Survival Under Compiler-based Binary Diversification Schemes
Submitted by grigby1 on Tue, 10/10/2017 - 10:52am
code reuse attacks
compiler transformations
composability
evaluation
Metrics
pubcrawl
Resiliency
return-oriented programming (ROP)
rop attacks
Scalability
software diversity