International audienceEven if a software is proven sound and secure, an attacker can still insert vulnerabilities with fault attacks. In this paper, we propose HAPEI, an Instruction Set Randomization scheme to guarantee Program Execution Integrity even in the presence of hardware fault injection. In particular, we propose a new solution to the multi-predecessors problem. This scheme is then implemented as a hardened CHIP-8 virtual machine, able to ensure program execution integrity, to prove the viability and to explore the limits of HAPEI
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
International audienceThe increasing complexity of software and hardware layers makes them likely to...
International audienceEven if a software is proven sound and secure, an attacker can still insert vu...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
One of the most common forms of security attacks involves exploiting a vulnerability to inject malic...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
International audienceThe paper explores hardware supports for replaying instructions to protect pro...
Code injection attacks continue to pose a threat to today’s comput-ing systems, as they exploit soft...
Embedded processors can be subject to physical attacks due to some proximity between an attacker and...
Soft errors in embedded systems' memories like single-event upsets and multiple-bit upsets lead to d...
147 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2003.Security problems in computer...
Abstract—A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
International audienceThe increasing complexity of software and hardware layers makes them likely to...
International audienceEven if a software is proven sound and secure, an attacker can still insert vu...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
One of the most common forms of security attacks involves exploiting a vulnerability to inject malic...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
International audienceThe paper explores hardware supports for replaying instructions to protect pro...
Code injection attacks continue to pose a threat to today’s comput-ing systems, as they exploit soft...
Embedded processors can be subject to physical attacks due to some proximity between an attacker and...
Soft errors in embedded systems' memories like single-event upsets and multiple-bit upsets lead to d...
147 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2003.Security problems in computer...
Abstract—A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
International audienceThe increasing complexity of software and hardware layers makes them likely to...