With more embedded systems networked, it becomes an important research problem to effectively defend embed-ded systems against buffer overflow attacks and efficiently check if systems have been protected. In this paper, we pro-pose the HSDefender (Hardware/Software Defender) tech-nique that considers the protection and checking together to solve this problem. Our basic idea is to design a secure instruction set and require third-party software developers to use secure instructions to call functions. Then the se-curity checking can be easily performed by system integra-tors even without the knowledge of the source code. We first classify buffer overflow attacks into two categories, stack smashing attacks and function pointer attacks, and the...
Buffer overflow vulnerabilities are the most prevalent security vulnerabilities; they are responsibl...
Buffer-overflow attacks began two decades ago and persist today. Over that time, many solutions to p...
[[abstract]]Buffer overflow has always been a dominant issue of system security. Many computer virus...
Embedded systems have a plethora of role in all spheres of life ranging from medical application to ...
International audienceFault attacks have been developed in the cryptographic com-munity to extract s...
Abstract Buffer overflow poses a serious threat to the memory security of modern operating systems. ...
Fault tolerant software against fault attacks constitutes an important class of countermeasures for ...
The vast majority of software vulnerabilities still originates from buffer overflows. Many different...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vuln...
In this paper, we examine the possibility of using virtualization to implement a countermeasure that...
A buffer overflow attack is perhaps the most common attack used to compromise the security of a host...
With the rapid development of embedded systems, the systems’ security has become more and more impor...
Buffer overflow attacks cause serious security problems. Array & pointer bound checking is one o...
Buffer overflow vulnerabilities are the most prevalent security vulnerabilities; they are responsibl...
Buffer-overflow attacks began two decades ago and persist today. Over that time, many solutions to p...
[[abstract]]Buffer overflow has always been a dominant issue of system security. Many computer virus...
Embedded systems have a plethora of role in all spheres of life ranging from medical application to ...
International audienceFault attacks have been developed in the cryptographic com-munity to extract s...
Abstract Buffer overflow poses a serious threat to the memory security of modern operating systems. ...
Fault tolerant software against fault attacks constitutes an important class of countermeasures for ...
The vast majority of software vulnerabilities still originates from buffer overflows. Many different...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vuln...
In this paper, we examine the possibility of using virtualization to implement a countermeasure that...
A buffer overflow attack is perhaps the most common attack used to compromise the security of a host...
With the rapid development of embedded systems, the systems’ security has become more and more impor...
Buffer overflow attacks cause serious security problems. Array & pointer bound checking is one o...
Buffer overflow vulnerabilities are the most prevalent security vulnerabilities; they are responsibl...
Buffer-overflow attacks began two decades ago and persist today. Over that time, many solutions to p...
[[abstract]]Buffer overflow has always been a dominant issue of system security. Many computer virus...