Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
rop attacks
biblio
Bypassing memory safety mechanisms through speculative control flow hijacks
Submitted by aekwall on Mon, 03/14/2022 - 1:35pm
programming
rop attacks
Transient Execution
Speculative ROP
side channels
operating system security
Memory Safety Mechanisms
Buffer overflows
Computer bugs
Runtime
Force
process control
composability
Resiliency
Scalability
pubcrawl
Human Factors
Hardware Security
Software
biblio
MAJORCA: Multi-Architecture JOP and ROP Chain Assembler
Submitted by aekwall on Mon, 03/14/2022 - 1:34pm
gadget
rop attacks
ROP compiler
ROP chain
ROP benchmark
ROP
return-oriented programming
restricted symbols
Payload
Jump-Oriented Programming
JOP
gadget frame
gadget catalog
Benchmark testing
code-reuse attack
codes
Registers
composability
Resiliency
Scalability
pubcrawl
Heuristic algorithms
operating systems
computer architecture
Human Factors
Measurement
biblio
Multi-Granularity Control Flow Anomaly Detection with Hardware Counters
Submitted by grigby1 on Fri, 02/04/2022 - 2:50pm
Hardware Security
Two-Level Predictor
Time factors
Return Oriented Programming (ROP)
return oriented programming
Resource Efficient
resilience
programming
Program processors
PMU
performance counters
microarchitecture
machine learning
rop attacks
Hardware
embedded systems
embedded security
Dynamic Control Flow Integrity
Buffer overflows
buffer overflow
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
Twine Stack: A Hybrid Mechanism Achieving Less Cost for Return Address Protection
Submitted by grigby1 on Fri, 02/04/2022 - 2:49pm
Hardware
Table lookup
shadow stack
Runtime
return-oriented programming
Return Oriented Programming (ROP)
return oriented programming
resilience
programming
message authentication code
rop attacks
Costs
codes
authentication
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
RSGX: Defeating SGX Side Channel Attack with Return Oriented Programming
Submitted by grigby1 on Fri, 02/04/2022 - 2:49pm
programming
side-channel attacks
side channel attack
SGX
Semantics
Runtime
ROP
Return Oriented Programming (ROP)
return oriented programming
resilience
rop attacks
Loading
data privacy
Conferences
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices
Submitted by grigby1 on Fri, 02/04/2022 - 2:48pm
IoT
Scalability
rop attacks
return-oriented programming
Return Oriented Programming (ROP)
return oriented programming
Resiliency
resilience
pubcrawl
Power demand
Information Reuse
Incremental Code Update
Human Factors
Generators
encryption
Computer crime
composability
codes
authentication
security
biblio
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
Submitted by grigby1 on Fri, 02/04/2022 - 2:48pm
rop attacks
pubcrawl
Resiliency
Scalability
composability
Human Factors
Code Obfuscation
Program Protection
programming
resilience
return oriented programming
Return Oriented Programming (ROP)
Robustness
ROP
Software
biblio
Evaluation of the Executional Power in Windows using Return Oriented Programming
Submitted by grigby1 on Fri, 02/04/2022 - 2:48pm
privacy
Windows
Turing-completeness
tools
security
ROP chain
Return Oriented Programming (ROP)
return oriented programming
resilience
programming
rop attacks
evaluation
Conferences
automatic exploit
Aerospace electronics
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture
Submitted by aekwall on Mon, 05/03/2021 - 1:06pm
return oriented programming
Algorithms
composability
computer architecture
Human Factors
Instruction sets
Payloads
pubcrawl
Registers
Resiliency
rop attacks
Scalability
Task Analysis
Windows
biblio
On Runtime Software Security of TrustZone-M Based IoT Devices
Submitted by aekwall on Mon, 05/03/2021 - 1:06pm
pubcrawl
TrustZone
software security
security
Scalability
Runtime
rop attacks
Resiliency
Random access memory
return oriented programming
Payloads
microcontroller
malware
Internet of Things
Human Factors
encoding
composability
« first
‹ previous
1
2
3
4
5
6
next ›
last »