Since the widespread adoption of the internet, computer security has become one of the primary concerns of computer systems engineers, who are often faced with a choice between increased performance and stronger security policies. Many advancements in computer security impose a performance penalty. One such advancement, control-flow integrity (CFI), offers immunity to code-reuse attacks but slows down software that enforces CFI. In this work, we present a hardware monitor design that utilizes hardware support for instruction tracing to detect code-reuse attacks. The monitor is small in hardware size, uses low power, and does not decrease software performance.LimitedAuthor requested closed access (OA after 2yrs) in Vireo ETD syste
Abstract: Many modern embedded systems use networks to communicate. This increases the attack surfa...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Code reuse techniques can circumvent existing security measures. For example, attacks such as Return...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceEmbedded systems often implement safety critical applications making security ...
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related vulnerab...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
A popular software attack on a program is by transferring the program control to malicious code inse...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
Abstract: Many modern embedded systems use networks to communicate. This increases the attack surfa...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Code reuse techniques can circumvent existing security measures. For example, attacks such as Return...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceEmbedded systems often implement safety critical applications making security ...
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related vulnerab...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
A popular software attack on a program is by transferring the program control to malicious code inse...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
Abstract: Many modern embedded systems use networks to communicate. This increases the attack surfa...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Over the past decades, the major objectives of computer design have been to improve performance and ...