The pervasive presence of smart objects in almost every corner of our everyday life urges the security of such embedded systems to be the point of attention. Memory vulnerabilities in the embedded program code, such as buffer overflow, are the entry point for powerful attack paradigms such as Code-Reuse Attacks (CRAs), in which attackers corrupt systems’ execution flow and maliciously alter their behavior. Control-Flow Integrity (CFI) has been proven to be the most promising approach against such kinds of attacks, and in the literature, a wide range of flow monitors are proposed, both hardware-based and software-based. While the formers are hardly applicable as they impose design alteration of underlying hardware modules, on the contrary, s...
A popular software attack on a program is by transferring the program control to malicious code inse...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
While security protections continue to be developed for general-purpose computers,real-time computin...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
As embedded systems become more connected and more ubiquitous in mission- and safety-critical system...
Nowadays, the growing pervasiveness of digital components and their interconnection in the so-called...
Abstract—As existing defenses like ALSR, DEP, and stack cookies are not sufficient to stop determine...
A popular software attack on a program is by transferring the program control to malicious code inse...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
While security protections continue to be developed for general-purpose computers,real-time computin...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
As embedded systems become more connected and more ubiquitous in mission- and safety-critical system...
Nowadays, the growing pervasiveness of digital components and their interconnection in the so-called...
Abstract—As existing defenses like ALSR, DEP, and stack cookies are not sufficient to stop determine...
A popular software attack on a program is by transferring the program control to malicious code inse...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...