As embedded systems become more connected and more ubiquitous in mission- and safety-critical systems, embedded devices have become a high- value target for hackers and security researchers. Attacks on real-time embedded systems software can put lives in danger and put our critical infrastructure at risk. Despite this, security techniques for embedded systems have not been widely studied. Many existing software security techniques for general purpose computers rely on assumptions that do not hold in the embedded case. This thesis focuses on one such technique, control-flow integrity (CFI), that has been vetted as an effective countermeasure against control-flow hijacking attacks on general purpose computing systems. Without the process isol...
ABSTRACT This paper presents a control flow enforcement technique based on an Instruction Based Memo...
Defenses such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and sta...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
While security protections continue to be developed for general-purpose computers,real-time computin...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
<p>Embedded software today is pervasive: they can be found everywhere, from coffee makers and medica...
A popular software attack on a program is by transferring the program control to malicious code inse...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
ABSTRACT This paper presents a control flow enforcement technique based on an Instruction Based Memo...
Defenses such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and sta...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
While security protections continue to be developed for general-purpose computers,real-time computin...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
<p>Embedded software today is pervasive: they can be found everywhere, from coffee makers and medica...
A popular software attack on a program is by transferring the program control to malicious code inse...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
ABSTRACT This paper presents a control flow enforcement technique based on an Instruction Based Memo...
Defenses such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and sta...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...