Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
code randomization
biblio
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries
Submitted by aekwall on Thu, 04/08/2021 - 3:34pm
rewriting systems
system-level security facilities
rewriting-based randomization
quantitative assessment
legacy software systems
legacy software
legacy binaries
fine-grained randomization tools
code-reuse attacks
Binary Rewriting
advanced security attacks
Information Reuse and Security
security of data
source code
Binary codes
code-reuse attack
fine-grained code randomization
code randomization
Compositionality
software maintenance
risk assessment
pubcrawl
Resiliency
biblio
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency
Submitted by aekwall on Thu, 04/08/2021 - 3:33pm
Proposals
testing
Semantics
semantic consistency
security
Scalability
rop attacks
Resiliency
pubcrawl
Prototypes
return oriented programming
Information Reuse and Security
Human Factors
Entropy
computer architecture
Compositionality
composability
code reuse attacks
code randomization
biblio
MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks
Submitted by grigby1 on Fri, 03/27/2020 - 10:38am
sandboxing
mitigation method
MicroGuard
microcontrollers
Internet of Things devices
Data protection
component-level sandboxing
bare-metal microcontrollers
bare-metal micro controllers
automated code randomization
Internet of Things
source code (software)
code randomization
code-reuse attacks
composability
IoT devices
policy-based governance
pubcrawl
collaboration
security of data
biblio
An Approach of Code Pointer Hiding Based on a Resilient Area
Submitted by grigby1 on Mon, 03/23/2020 - 2:58pm
Information systems
source code (software)
Software
security of data
security
Scalability
rop attacks
resilient area
resilience
pubcrawl
pointer hiding
Payloads
memory disclosure vulnerability
Layout
Information Reuse and Security
information system security
Human Factors
Human behavior
flow graphs
Diversity methods
composability
code reuse attack
code reuse
code randomization
code pointer hiding
attack scenario
Resiliency
Compositionality
biblio
Compiler-Assisted Code Randomization
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
Scalability
Prototypes
pubcrawl
randomized variants
Resiliency
return oriented programming
return-oriented programming
Robustness
Runtime
program compilers
security
security of data
Software
software distribution models
software distribution norms
software diversification
software engineering
transformation-assisting metadata
composability
applied code transformation
CCR
code randomization
code uniformity
compiler level protection
compiler-assisted code randomization
compiler-rewriter cooperation
compiler security
address space layout randomization
Compositionality
fine-grained code randomization
fine-grained code transformation
Hardware
Human behavior
LLVM compiler toolchain
metadata
Metrics
biblio
Moving Targets vs. Moving Adversaries: On the Effectiveness of System Randomization
Submitted by grigby1 on Wed, 05/16/2018 - 12:45pm
code randomization
leakage resilience
memory disclosure
pubcrawl
resilience
Resiliency
runtime attacks and defenses