Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
rop attacks
biblio
CFI: Control Flow Integrity or Control Flow Interruption?
Submitted by aekwall on Mon, 02/24/2020 - 10:01am
return oriented programming
malicious code injection
modern Code Reuse Attacks
Monitoring
object-oriented programming
Payloads
programming
pubcrawl
Resiliency
Libraries
return-oriented programming
Runtime
runtime attacks
runtime memory vulnerabilities
Scalability
security of data
target system
rop attacks
Jump-Oriented Programming
interrupt requests
Human Factors
famous attack paradigms
execution flow
data flow analysis
data execution prevention
corrupt code pointers
control-flow integrity
Control Flow Integrity
computer security
composability
CFI-based defenses
CFI solutions
C++ languages
biblio
Semantics-Directed Prototyping of Hardware Runtime Monitors
Submitted by grigby1 on Mon, 11/04/2019 - 11:35am
ROP-style code reuse attacks
Monitoring
multiple memory accesses
pubcrawl
rapid-prototyping runtime monitors
reconfigurable architectures
resilience
Resiliency
rop attacks
Model driven development
Runtime
Scalability
security of data
Semantics
semantics-directed prototyping
software monitor
software-based attacks
Biomedical monitoring
Instruction sets
Human Factors
Human behavior
high level synthesis
hardware-based protection
Hardware Security
hardware runtime monitors
hardware monitor
Hardware
formal verification
embedded systems
embedded processor
embedded hardware
composability
building memory protection mechanisms
biblio
Let's Shock Our IoT's Heart: ARMv7-M Under (Fault) Attacks
Submitted by grigby1 on Mon, 11/04/2019 - 11:35am
Backdoor
buffer overflow
composability
Electromagnetic Fault Injection (EMFI)
Fault injection
Human behavior
Human Factors
microcontroller
physical attacks
pubcrawl
resilience
Resiliency
return oriented programming
rop attacks
Scalability
Vulnerability Insertion
biblio
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use
Submitted by grigby1 on Mon, 11/04/2019 - 11:34am
ROP Defense
programming
pubcrawl
Randomization
Registers
resilience
return-oriented programming
return-oriented programming attack
rop attacks
OS
Scalability
security mechanisms
security of data
Software
software watermarking
Steganography
Watermarking
defense mechanisms
Compositionality
Resiliency
Benign Use of ROP
code integrity verification
code reuse attack
composability
computer security
Control Flow Integrity
Information Reuse and Security
extended ROP attack
frequency control
Human behavior
Human Factors
Layout
operating system
operating systems (computers)
biblio
On the Effectiveness of Type-Based Control Flow Integrity
Submitted by grigby1 on Mon, 11/04/2019 - 11:34am
composability
Human behavior
Human Factors
pubcrawl
resilience
Resiliency
rop attacks
Scalability
biblio
Using Hardware Performance Counters to Detect Control Hijacking Attacks
Submitted by aekwall on Mon, 10/14/2019 - 9:21am
rop attacks
Attack detection
composability
Hardware performance counters
Human behavior
Human Factors
malicious code execution
pubcrawl
Resiliency
return oriented programming
Scalability
security
biblio
Spectre Attacks: Exploiting Speculative Execution
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
Program processors
Transient analysis
speculative-execution
Spectre
side-channel attacks
Scalability
return oriented programming
Resiliency
Registers
pubcrawl
rop attacks
microarchitecture-security
microarchitecture
microarchitectural-attack
Human Factors
Human behavior
Hardware
composability
arrays
biblio
ROPMate: Visually Assisting the Creation of ROP-based Exploits
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
ROP chains
visual analytics system
visual analytics
visual aids
tools
Task Analysis
software reliability
semantically meaningful gadgets
semantically correct chains
security of data
security
Scalability
ROPMate
ROP-based exploits
ROP-based attacks
ROP Exploits
Buildings
rop attacks
return-oriented programming
return oriented programming
Resiliency
Registers
pubcrawl
programming
program testing
Malware Analysis
Human behavior
data visualisation
data analysis
composability
code reuse
biblio
Hardware-Based Adversary-Controlled States Tracking
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
Pipelines
target tracking
software security challenges
Software
security of data
Scalability
rop attacks
return oriented programming
Resiliency
Registers
pubcrawl
programming
program diagnostics
classic dynamic taint analysis method
memory vulnerabilities
memory data
Linux applications
Linux
Human behavior
HAST
Hardware-based Adversary-controlled States
Hardware
dynimic taint analysis
control flow
composability
code-reuse attack
biblio
Multilayer ROP Protection Via Microarchitectural Units Available in Commodity Hardware
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
multilayer protection approach
Web browsers
security of data
Scalability
Runtime
ROP
Return-oriented Programming attacks
return oriented programming
Resiliency
RAS
pubcrawl
Program processors
Nonhomogeneous media
multilayer system
multilayer ROP protection
rop attacks
microarchitecture
microarchitectural units
lightweight security techniques
LBR
layers
Human Factors
Human behavior
Hardware
computer architecture
composability
commodity hardware
CFI
Benchmark testing
architecture
« first
‹ previous
1
2
3
4
5
6
next ›
last »