ABSTRACT This paper presents a control flow enforcement technique based on an Instruction Based Memory Access Control (IB-MAC) implemented in hardware. It is specifically designed to protect low-cost embedded systems against malicious manipulation of their control flow as well as preventing accidental stack overflows. This is achieved by using a simple hardware modification to divide the stack in a data and a control flow stack (or return stack). Moreover access to the control flow stack is restricted only to return and call instructions, which prevents control flow manipulation. Previous solutions tackled the problem of control flow injection on general purpose computing devices and are rarely applicable to the simpler low-cost embedded de...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
Abstract. Protection against software piracy and malicious modifica-tion of software is proving to b...
International audienceEmbedded systems often implement safety critical applications making security ...
The security of low-end embedded systems became a very important topic as they are more connected an...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
While security protections continue to be developed for general-purpose computers,real-time computin...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Defenses such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and sta...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
As embedded systems become more connected and more ubiquitous in mission- and safety-critical system...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities,...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
Abstract. Protection against software piracy and malicious modifica-tion of software is proving to b...
International audienceEmbedded systems often implement safety critical applications making security ...
The security of low-end embedded systems became a very important topic as they are more connected an...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
While security protections continue to be developed for general-purpose computers,real-time computin...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Defenses such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and sta...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
As embedded systems become more connected and more ubiquitous in mission- and safety-critical system...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities,...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
Abstract. Protection against software piracy and malicious modifica-tion of software is proving to b...
International audienceEmbedded systems often implement safety critical applications making security ...