We are surrounded by more and more CPS, controlling multiple aspects of our lives, including safety-critical tasks where consequences of failure can be catastrophic. We put a lot of trust in them, but that is not always justified. They are integrated into a physical environment and are therefore often constrained to limited resources, and at the same time, they are incredibly complex. Real-time systems with strict timing bounds have to guarantee that activities finish before their deadline is reached, in addition to the functional requirements of those activities. Ensuring the quality of such systems is expensive and complicated. Meanwhile, cyber attacks threaten CPS just as any computing system. In particular, the widespread use of unsafe...
Abstract—The software monoculture favors attackers over defenders, since it makes all target environ...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Diversity is an important source of robustness in biological systems. Computers, by contrast, are no...
Artificial Software Diversity is a well-established method to increase security of computer systems ...
Code-reuse attacks are notoriously hard to defeat, and many current solutions to the problem focus o...
This work discusses the role of diversity as a mean towards secure monitoring and control. The intui...
Safety-critical real-time systems often rely on time provisioning strategies. These are especially a...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
With computer software pervading every aspect of our lives, vulnerabilities pose an active threat. M...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
WebAssembly has become the fourth official web language, along with HTML, CSS and JavaScript since 2...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilien...
Abstract—The software monoculture favors attackers over defenders, since it makes all target environ...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Diversity is an important source of robustness in biological systems. Computers, by contrast, are no...
Artificial Software Diversity is a well-established method to increase security of computer systems ...
Code-reuse attacks are notoriously hard to defeat, and many current solutions to the problem focus o...
This work discusses the role of diversity as a mean towards secure monitoring and control. The intui...
Safety-critical real-time systems often rely on time provisioning strategies. These are especially a...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
With computer software pervading every aspect of our lives, vulnerabilities pose an active threat. M...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
WebAssembly has become the fourth official web language, along with HTML, CSS and JavaScript since 2...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilien...
Abstract—The software monoculture favors attackers over defenders, since it makes all target environ...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Diversity is an important source of robustness in biological systems. Computers, by contrast, are no...