The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-critical or safety-critical applications domains, like automotive or aeronautical, make devices attractive targets for attackers. Nowadays, several of these are mixed-criticality systems, i.e., they run both high-criticality tasks (e.g., a car control system) and low-criticality ones (e.g., infotainment). High-criticality routines often employ Real-Time Operating Systems (RTOS) to enforce hard real-time requirements, while the tasks with lower constraints can be delegated to more generic-purpose operating systems (GPOS). Much of the control code for these devices is written in memory-unsafe languages such as C and C++. This makes them susceptibl...
Today's embedded systems are becoming increasingly complex. We are seeing many devices consolidate b...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-cri...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
Nowadays, the growing pervasiveness of digital components and their interconnection in the so-called...
Real-Time Operating System (RTOS) presents a computing environment with the ability to react to even...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...
While security protections continue to be developed for general-purpose computers,real-time computin...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
Code reuse attacks (CRAs), such as return-oriented programming (ROP) and jump-oriented programming (...
As embedded systems become more connected and more ubiquitous in mission- and safety-critical system...
Today's embedded systems are becoming increasingly complex. We are seeing many devices consolidate b...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-cri...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
Nowadays, the growing pervasiveness of digital components and their interconnection in the so-called...
Real-Time Operating System (RTOS) presents a computing environment with the ability to react to even...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...
While security protections continue to be developed for general-purpose computers,real-time computin...
Devices built on embedded systems are widely used in our daily lives. Nowadays, firmware typically u...
Code reuse attacks (CRAs), such as return-oriented programming (ROP) and jump-oriented programming (...
As embedded systems become more connected and more ubiquitous in mission- and safety-critical system...
Today's embedded systems are becoming increasingly complex. We are seeing many devices consolidate b...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...