While security protections continue to be developed for general-purpose computers,real-time computing has remained unprotected against control-flow hijacking attacks.Existing solutions rely on hardware unavailable to embedded systems due to the cost, or impose excessive overhead, leaving real-time applications unable to operate within their time constraints. We propose RECFISH++, a Control-Flow Integrity implementation focused on protecting real-time embedded systems. By modifying LLVM and FreeRTOS, a popular compiler back-end and real-time operating system, we provide an end-to-end solution for protecting any real-time application on the ARM Cortex-M microprocessor against control-flow hijacking attacks
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...
| openaire: EC/H2020/643964/EU//SUPERCLOUDMemory-unsafe programming languages like C and C++ leave m...
As embedded systems become more connected and more ubiquitous in mission- and safety-critical system...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
ABSTRACT This paper presents a control flow enforcement technique based on an Instruction Based Memo...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Abstract—Control flow hijacking has been a major challenge in software security. Several means of pr...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...
| openaire: EC/H2020/643964/EU//SUPERCLOUDMemory-unsafe programming languages like C and C++ leave m...
As embedded systems become more connected and more ubiquitous in mission- and safety-critical system...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
ABSTRACT This paper presents a control flow enforcement technique based on an Instruction Based Memo...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Abstract—Control flow hijacking has been a major challenge in software security. Several means of pr...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...
| openaire: EC/H2020/643964/EU//SUPERCLOUDMemory-unsafe programming languages like C and C++ leave m...