Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
code-reuse attacks
biblio
Control-Flow Integrity for Real-Time Operating Systems: Open Issues and Challenges
Submitted by aekwall on Mon, 03/14/2022 - 1:35pm
composability
rop attacks
operating systems
control-flow integrity
code-reuse attacks
Buffer overflows
ROP
codes
Cybersecurity
Focusing
security
Resiliency
Scalability
pubcrawl
real-time systems
Human Factors
Software
Hardware
embedded systems
biblio
A FPGA-based Control-Flow Integrity Solution for Securing Bare-Metal Embedded Systems
Submitted by aekwall on Mon, 05/03/2021 - 1:05pm
JOP
interrupt
forward edges
bare-metal
backward edges
code-reuse attacks
rop attacks
ROP
return-oriented programming
security
Human Factors
microcontrollers
firmware
composability
pubcrawl
Resiliency
embedded systems
Scalability
biblio
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
rewriting systems
system-level security facilities
rewriting-based randomization
quantitative assessment
legacy software systems
legacy software
legacy binaries
fine-grained randomization tools
code-reuse attacks
Binary Rewriting
advanced security attacks
Information Reuse and Security
security of data
source code
Binary codes
code-reuse attack
fine-grained code randomization
code randomization
Compositionality
software maintenance
risk assessment
pubcrawl
Resiliency
biblio
MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
sandboxing
mitigation method
MicroGuard
microcontrollers
Internet of Things devices
Data protection
component-level sandboxing
bare-metal microcontrollers
bare-metal micro controllers
automated code randomization
Internet of Things
source code (software)
code randomization
code-reuse attacks
composability
IoT devices
policy-based governance
pubcrawl
collaboration
security of data
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
biblio
Securing Real-Time Cyber-Physical Systems Using WCET-Aware Artificial Diversity
Submitted by grigby1 on Wed, 05/09/2018 - 2:57pm
software errors
real-time systems
resilience
Resiliency
Safe Coding
safe diversity approach
safety-critical real-time systems
safety-critical software
security
security of data
real-time processes
software vulnerabilities
static WCET analysis
timing
timing guarantees
timing properties
unacceptable performance overheads
WCET
WCET-aware artificial diversity
worst case execution time
Layout
artificial software diversity
block-level diversity
code-reuse attacks
collaboration
cyber-physical systems
embedded systems
hardware resources
Human Factors
individual probability
Artificial Diversity
Metrics
movable instruction sequences
policy-based governance
Policy-Governed Secure Collaboration
probability
pubcrawl
real-time
real-time cyber-physical systems