Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
JOP
biblio
Real-Time Control-Flow Integrity for Multicore Mixed-Criticality IoT Systems
Submitted by aekwall on Fri, 02/17/2023 - 9:41am
composability
software security
rop attacks
operating systems
control-flow integrity
ROP
return-oriented programming
JOP
Multicore processing
control systems
Internet of Things
security
Resiliency
Scalability
pubcrawl
Virtual machine monitors
real-time systems
IoT
Human Factors
timing
Software
biblio
MAJORCA: Multi-Architecture JOP and ROP Chain Assembler
Submitted by aekwall on Mon, 03/14/2022 - 12:34pm
gadget
rop attacks
ROP compiler
ROP chain
ROP benchmark
ROP
return-oriented programming
restricted symbols
Payload
Jump-Oriented Programming
JOP
gadget frame
gadget catalog
Benchmark testing
code-reuse attack
codes
Registers
composability
Resiliency
Scalability
pubcrawl
Heuristic algorithms
operating systems
computer architecture
Human Factors
Measurement
biblio
A FPGA-based Control-Flow Integrity Solution for Securing Bare-Metal Embedded Systems
Submitted by aekwall on Mon, 05/03/2021 - 12:05pm
JOP
interrupt
forward edges
bare-metal
backward edges
code-reuse attacks
rop attacks
ROP
return-oriented programming
security
Human Factors
microcontrollers
firmware
composability
pubcrawl
Resiliency
embedded systems
Scalability
biblio
Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications
Submitted by aekwall on Mon, 10/14/2019 - 9:19am
privacy
FOP gadgets
function-oriented programming
Human behavior
JOP
Jump-Oriented Programming
Layout
Linux
Linux x64 environment
malicious program behavior
object oriented security
object-oriented programming
FOP attack
proftpd1.3.0 server
pubcrawl
return oriented programming
return-oriented programming
ROP
Scalability
security
security of data
Servers
shadow stack technology
tools
code reuse attack
Compositionality
Resiliency
address space layout randomization
ASLR
C Applications
C languages
C program
CFI
coarse-grained CFI
coarse-grained control-flow integrity
code injection attacks
Information Reuse and Security
code reuse attacks
composability
Conferences
Control-hijacking attacks
COOP
Counterfeit Object-oriented Programming
data-execution prevention
DEP
existing function
fine-grained CFI technologies
FOP