Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
shadow stack
biblio
Twine Stack: A Hybrid Mechanism Achieving Less Cost for Return Address Protection
Submitted by grigby1 on Fri, 02/04/2022 - 2:49pm
Hardware
Table lookup
shadow stack
Runtime
return-oriented programming
Return Oriented Programming (ROP)
return oriented programming
resilience
programming
message authentication code
rop attacks
Costs
codes
authentication
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return Addresses**Thanks to all the reviewers for their valuable comments. This research is supported by an Australian Research Council grant (DP180104069).
Submitted by aekwall on Mon, 05/03/2021 - 1:05pm
return oriented programming
Benchmark testing
Binary codes
composability
Control Flow Integrity
Human Factors
programming
pubcrawl
Resiliency
return-oriented programming
rop attacks
Runtime
Runtime Rerandomization
Scalability
shadow stack
biblio
FIXER: Flow Integrity Extensions for Embedded RISC-V
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
integrated Rocket Custom Coprocessor
program compilers
security framework
RISC-V
buffer overflow
Code injection
coprocessors
fine-grained control-flow integrity
FIXER
flow integrity extensions for embedded RISC-V
return oriented programming
low-power embedded devices
open source architecture
RISC-V architecture
RISC-V processor core
RISC-V SoC platform
RISC-V toolchains
Rockets
security extension
shadow stack
Buffer overflows
Scalability
Internet of Things
data integrity
Hardware
security
embedded systems
reduced instruction set computing
system-on-chip
computer architecture
security of data
Resiliency
pubcrawl
composability
software reusability
Software Architecture
Bars
Human Factors
code reuse attacks
ROP
biblio
Control-Flow Integrity: Precision, Security, and Performance
Submitted by grigby1 on Mon, 12/10/2018 - 11:27am
resilience
pubcrawl
Human behavior
Resiliency
Scalability
composability
Human Factors
return oriented programming
return-oriented programming
shadow stack
control-flow hijacking
control-flow integrity
biblio
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace
Submitted by grigby1 on Fri, 09/28/2018 - 4:14pm
security
resilience
pubcrawl
composability
Scalability
Metrics
edge detection
Resiliency
Control Flow Integrity
Intel PT
return oriented programming
shadow stack
biblio
Architectural Supports to Protect OS Kernels from Code-Injection Attacks and Their Applications
Submitted by grigby1 on Tue, 01/23/2018 - 3:07pm
return oriented programming
architectural support for security
code-injection attacks
composability
Metrics
operating system security
Operating systems security
pubcrawl
Resiliency
return-oriented programming
shadow stack