Cyber attacks are based on intrusions into digital systems by exploiting bugs to take control over the system. Many protections have been developed to thwart cyber attack, among them we can quote code obfuscation, memory integrity check, instruction set randomization, address space layout randomization (ASLR), canary, sand boxing, process isolation, virtualization and access right restriction. Modern processors provide security by zone isolation systems (Protection ring, MMU, NX bit, TrustZone), Control Flow Integrity (CFI) is a new technique proposed by Abadi et al. to mitigate program corruption. This technique gave rise to many implementations but none are complete, fast and easily incorporable to existing processor. This thesis is insp...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Les processeurs embarqués peuvent faire l’objet d’attaques physiques en raison de la proximité entre...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceIn this paper we present a hardware based solution to verify simultaneously Co...
Memory corruption attacks have been a major issue in software security for over two decades and are ...
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking atta...
Abstract—Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijac...
Embedded systems are ubiquitous in our everyday life. Those embedded systems, by their nomadic natur...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Defenses such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and sta...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Embedded processors can be subject to physical attacks due to some proximity between an attacker and...
Abstract—As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determine...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Les processeurs embarqués peuvent faire l’objet d’attaques physiques en raison de la proximité entre...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceIn this paper we present a hardware based solution to verify simultaneously Co...
Memory corruption attacks have been a major issue in software security for over two decades and are ...
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking atta...
Abstract—Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijac...
Embedded systems are ubiquitous in our everyday life. Those embedded systems, by their nomadic natur...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Defenses such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and sta...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Embedded processors can be subject to physical attacks due to some proximity between an attacker and...
Abstract—As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determine...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Les processeurs embarqués peuvent faire l’objet d’attaques physiques en raison de la proximité entre...
Since the widespread adoption of the internet, computer security has become one of the primary conce...