Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
rop attacks
biblio
Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return Addresses**Thanks to all the reviewers for their valuable comments. This research is supported by an Australian Research Council grant (DP180104069).
Submitted by aekwall on Mon, 05/03/2021 - 1:05pm
return oriented programming
Benchmark testing
Binary codes
composability
Control Flow Integrity
Human Factors
programming
pubcrawl
Resiliency
return-oriented programming
rop attacks
Runtime
Runtime Rerandomization
Scalability
shadow stack
biblio
Saffire: Context-sensitive Function Specialization against Code Reuse Attacks
Submitted by aekwall on Mon, 05/03/2021 - 1:05pm
Scalability
Runtime
Software
Resiliency
pubcrawl
composability
Libraries
Complexity theory
Human Factors
software reliability
Layout
return oriented programming
rop attacks
Transforms
return into libc
software debloating
biblio
A FPGA-based Control-Flow Integrity Solution for Securing Bare-Metal Embedded Systems
Submitted by aekwall on Mon, 05/03/2021 - 1:05pm
JOP
interrupt
forward edges
bare-metal
backward edges
code-reuse attacks
rop attacks
ROP
return-oriented programming
security
Human Factors
microcontrollers
firmware
composability
pubcrawl
Resiliency
embedded systems
Scalability
biblio
AT-ROP: Using static analysis and binary patch technology to defend against ROP attacks based on return instruction
Submitted by aekwall on Mon, 05/03/2021 - 1:04pm
return oriented programming
binary patch
composability
feature extraction
Human Factors
Linux
parameter registers
programming
pubcrawl
Resiliency
rop attacks
Scalability
Software
static analysis
tools
Writing
biblio
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency
Submitted by aekwall on Thu, 04/08/2021 - 4:33pm
Proposals
testing
Semantics
semantic consistency
security
Scalability
rop attacks
Resiliency
pubcrawl
Prototypes
return oriented programming
Information Reuse and Security
Human Factors
Entropy
computer architecture
Compositionality
composability
code reuse attacks
code randomization
biblio
Dynamic reencryption of return addresses
Submitted by grigby1 on Mon, 03/23/2020 - 3:59pm
Cryptography
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
composability
rop attacks
dynamic reencryption
function returns
leaked return addresses
return address
biblio
Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems
Submitted by grigby1 on Mon, 03/23/2020 - 3:59pm
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
cyber physical systems
cyber security
composability
rop attacks
real time systems
schedulability analysis
biblio
An Approach of Code Pointer Hiding Based on a Resilient Area
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
Information systems
source code (software)
Software
security of data
security
Scalability
rop attacks
resilient area
resilience
pubcrawl
pointer hiding
Payloads
memory disclosure vulnerability
Layout
Information Reuse and Security
information system security
Human Factors
Human behavior
flow graphs
Diversity methods
composability
code reuse attack
code reuse
code randomization
code pointer hiding
attack scenario
Resiliency
Compositionality
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
biblio
Defending against ROP Attacks with Nearly Zero Overhead
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
Training
Monitoring
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
composability
Runtime
Libraries
Memory management
programming
static analysis
rop attacks
« first
‹ previous
1
2
3
4
5
6
next ›
last »