Memory-safety attacks are one of the most critical threats against Cyber-Physical Systems (CPS). As opposed to mainstream systems, CPS often impose stringent timing constraints. Given such timing constraints, how can we protect CPS from memory-safety attacks? In this paper, we propose a full-stack memory-safety attack detection method to address this challenge. We also quantify the notion of tolerability of memory-safety overheads (MSO) in terms of the expected real-time constraints of a typical CPS. We implemented and evaluated our proposed solution on a real-world Secure Water Treatment (SWaT) testbed. Concretely, we show that our proposed solution incurs a memory-safety overhead of 419.91Â µs, which is tolerable for the real-time constra...
When software is designed, even with security in mind, assumptions are made about the details of har...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
... attacks is becoming ever more challenging with the vast resources and techniques increasingly av...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Cyber Physical Systems (CPSs) are considered as an integration of computing, networking, and physica...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
The increasing connectivity is exposing safety-critical systems to cyberattacks that can cause real ...
Cyber physical systems (CPSs) are safety-critical, be it weapon systems, smart medical devices, or g...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
In this thesis, the safety and security problems in Cyber-Physical Systems (CPSs) are addressed. In ...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
Cyber-physical systems (CPS) use networked control software to interact with and manipulate the phys...
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical...
When software is designed, even with security in mind, assumptions are made about the details of har...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
... attacks is becoming ever more challenging with the vast resources and techniques increasingly av...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Cyber Physical Systems (CPSs) are considered as an integration of computing, networking, and physica...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
The increasing connectivity is exposing safety-critical systems to cyberattacks that can cause real ...
Cyber physical systems (CPSs) are safety-critical, be it weapon systems, smart medical devices, or g...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
In this thesis, the safety and security problems in Cyber-Physical Systems (CPSs) are addressed. In ...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
Cyber-physical systems (CPS) use networked control software to interact with and manipulate the phys...
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical...
When software is designed, even with security in mind, assumptions are made about the details of har...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
... attacks is becoming ever more challenging with the vast resources and techniques increasingly av...