Memory corruption attacks on SCADA devices can cause significant dis- ruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulner- abilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive techni...
Includes bibliographical references (pages 23-23)Supervisory Control And Data Acquisition (SCADA) is...
There exists a gap between existing security mechanisms and their ability to detect advancing threat...
Globalization of micro-chip fabrication has opened a new avenue of cyber-crime. It is now possible t...
The chapter introduces and describes representative defense mechanisms to protect from both basic an...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Pointer taintedness is a concept which has been successfully employed as basis for vulnerability ana...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Me...
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Me...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Adversaries exploit software vulnerabilities in modern software to compromise computer systems. Whil...
Vulnerability exploitation and its mitigation technologies have always been important in vulnerabili...
Trusting the data center and remote computing infrastructure is crucial for the users to move their ...
Memory corruptions are a major part of security attacks observed nowadays. Many protection mechanis...
Includes bibliographical references (pages 23-23)Supervisory Control And Data Acquisition (SCADA) is...
There exists a gap between existing security mechanisms and their ability to detect advancing threat...
Globalization of micro-chip fabrication has opened a new avenue of cyber-crime. It is now possible t...
The chapter introduces and describes representative defense mechanisms to protect from both basic an...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Pointer taintedness is a concept which has been successfully employed as basis for vulnerability ana...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Me...
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Me...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Adversaries exploit software vulnerabilities in modern software to compromise computer systems. Whil...
Vulnerability exploitation and its mitigation technologies have always been important in vulnerabili...
Trusting the data center and remote computing infrastructure is crucial for the users to move their ...
Memory corruptions are a major part of security attacks observed nowadays. Many protection mechanis...
Includes bibliographical references (pages 23-23)Supervisory Control And Data Acquisition (SCADA) is...
There exists a gap between existing security mechanisms and their ability to detect advancing threat...
Globalization of micro-chip fabrication has opened a new avenue of cyber-crime. It is now possible t...