Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically uses C and C++ for efficiency and durability. However, those languages are unsafe which can lead to many software and system security issues. Attackers can easily corrupt a system by issuing various memory corruption attacks on a vulnerable program. Control-flow integrity is one of the most prevalent mechanisms used to protect against memory corruption. Most research papers and prototypes focus on using CFI on high-performance chips such as Intel and ARM Cortex-A. However, many embedded systems targeting time critical services are built on resource constrained devices. Many mechanisms cannot work, or have large runtime overhead, when been appl...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Out-of-memory errors are a serious source of unreliability in embedded systems. This is because embe...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
As embedded systems become more connected and more ubiquitous in mission- and safety-critical system...
While security protections continue to be developed for general-purpose computers,real-time computin...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
ABSTRACT This paper presents a control flow enforcement technique based on an Instruction Based Memo...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Out-of-memory errors are a serious source of unreliability in embedded systems. This is because embe...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
As embedded systems become more connected and more ubiquitous in mission- and safety-critical system...
While security protections continue to be developed for general-purpose computers,real-time computin...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
ABSTRACT This paper presents a control flow enforcement technique based on an Instruction Based Memo...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Out-of-memory errors are a serious source of unreliability in embedded systems. This is because embe...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...