We present a novel technique to secure the execution of a processor against the execution of malicious code (trojans, viruses). The main idea is to permute parts of the opcode values so that it gets a different semantic meaning. A virus which does not know the permutation is not able to execute and will cause a failure such as segmentation violation, whereby the execution of malicious code is prevented. The permutation is realized by a lookup table. We develop several variants that require only small changes to microprocessors. We sketch how to bootstrap a system such that all intended applications (including operating system) are reversely permuted, and can execute as intended. While this will be cumbersome for typical personal computers, ...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
This paper describes a mechanism for protecting against malicious mobile code. As mobile code is lin...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
We present a novel technique to secure the execu-tion of a processor against the execution of malici...
The use of diversity and redundancy in the security do-main is an interesting approach to prevent or...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
This paper first investigates and analyzes security holes concerning the use of Server-Side Includes...
Industrial control systems (ICSs) are, at present, extremely vulnerable to cyber attack because they...
Parameter tampering attacks are dangerous to a web appli-cation whose server performs weaker data sa...
Ensuring the security and integrity of computer systems deployed on the Internet is growing harder. ...
Modern web applications store sensitive data on their servers. Such data is prone to theft resulting...
With more computing platforms connected to the Internet each day, computer system security has becom...
With more computing platforms connected to the Internet each day, computer system security has becom...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Abstract. Instruction-set randomization (ISR) obfuscates the “language” understood by a system to pr...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
This paper describes a mechanism for protecting against malicious mobile code. As mobile code is lin...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
We present a novel technique to secure the execu-tion of a processor against the execution of malici...
The use of diversity and redundancy in the security do-main is an interesting approach to prevent or...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
This paper first investigates and analyzes security holes concerning the use of Server-Side Includes...
Industrial control systems (ICSs) are, at present, extremely vulnerable to cyber attack because they...
Parameter tampering attacks are dangerous to a web appli-cation whose server performs weaker data sa...
Ensuring the security and integrity of computer systems deployed on the Internet is growing harder. ...
Modern web applications store sensitive data on their servers. Such data is prone to theft resulting...
With more computing platforms connected to the Internet each day, computer system security has becom...
With more computing platforms connected to the Internet each day, computer system security has becom...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Abstract. Instruction-set randomization (ISR) obfuscates the “language” understood by a system to pr...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
This paper describes a mechanism for protecting against malicious mobile code. As mobile code is lin...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...