Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
code-reuse attack
biblio
AddrArmor: An Address-based Runtime Code-reuse Attack Mitigation for Shared Objects at the Binary-level
Submitted by grigby1 on Mon, 06/06/2022 - 12:09pm
security
pubcrawl
Resiliency
Hardware
Instruments
Runtime
Compositionality
Performance analysis
Loading
codes
code-reuse attack
instrumentation
Information Reuse
biblio
MAJORCA: Multi-Architecture JOP and ROP Chain Assembler
Submitted by aekwall on Mon, 03/14/2022 - 1:34pm
gadget
rop attacks
ROP compiler
ROP chain
ROP benchmark
ROP
return-oriented programming
restricted symbols
Payload
Jump-Oriented Programming
JOP
gadget frame
gadget catalog
Benchmark testing
code-reuse attack
codes
Registers
composability
Resiliency
Scalability
pubcrawl
Heuristic algorithms
operating systems
computer architecture
Human Factors
Measurement
biblio
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
rewriting systems
system-level security facilities
rewriting-based randomization
quantitative assessment
legacy software systems
legacy software
legacy binaries
fine-grained randomization tools
code-reuse attacks
Binary Rewriting
advanced security attacks
Information Reuse and Security
security of data
source code
Binary codes
code-reuse attack
fine-grained code randomization
code randomization
Compositionality
software maintenance
risk assessment
pubcrawl
Resiliency
biblio
Hardware-Based Adversary-Controlled States Tracking
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Pipelines
target tracking
software security challenges
Software
security of data
Scalability
rop attacks
return oriented programming
Resiliency
Registers
pubcrawl
programming
program diagnostics
classic dynamic taint analysis method
memory vulnerabilities
memory data
Linux applications
Linux
Human behavior
HAST
Hardware-based Adversary-controlled States
Hardware
dynimic taint analysis
control flow
composability
code-reuse attack