International audienceThe emergence of Real-Time Systems with increased connections to their environment has led to a greater demand in security for these systems. Memory corruption attacks, which modify the memory to trigger unexpected executions, are a significant threat against applications written in low-level languages. Data-Flow Integrity (DFI) is a protection that verifies that only a trusted source has written any loaded data. The overhead of such a security mechanism remains a major issue that limits its adoption. This article presents RT-DFI, a new approach that optimizes the Data-Flow Integrity to reduce its overhead on the Worst-Case Execution Time. We model the number and order of the checks and use an Integer Linear Programmin...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Abstract—A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is ...
Control flow integrity or CFI has emerged as an important technique forpreventing attacks on softwar...
International audienceThe emergence of Real-Time Systems with increased connections to their environ...
Subverting runtime data flow is common in many current software attacks. Data Flow Integrity (DFI) i...
Data-oriented attacks, where the adversary corrupts critical program data in memory, remain one of t...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Data-oriented exploits are growing in popularity as defenders are closing attack vectorsrelated to c...
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing defense mechan...
| openaire: EC/H2020/643964/EU//SUPERCLOUDMemory-unsafe programming languages like C and C++ leave m...
Real-time systems have more and more ways to communicate wirelessly with external users. These same ...
Computer security is a very critical problem these days, as it has widespread consequences in case o...
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attacker...
Data flow integrity enforcement overview Data flow integrity enforcement uses static analysis to com...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Abstract—A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is ...
Control flow integrity or CFI has emerged as an important technique forpreventing attacks on softwar...
International audienceThe emergence of Real-Time Systems with increased connections to their environ...
Subverting runtime data flow is common in many current software attacks. Data Flow Integrity (DFI) i...
Data-oriented attacks, where the adversary corrupts critical program data in memory, remain one of t...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Data-oriented exploits are growing in popularity as defenders are closing attack vectorsrelated to c...
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing defense mechan...
| openaire: EC/H2020/643964/EU//SUPERCLOUDMemory-unsafe programming languages like C and C++ leave m...
Real-time systems have more and more ways to communicate wirelessly with external users. These same ...
Computer security is a very critical problem these days, as it has widespread consequences in case o...
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attacker...
Data flow integrity enforcement overview Data flow integrity enforcement uses static analysis to com...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Abstract—A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is ...
Control flow integrity or CFI has emerged as an important technique forpreventing attacks on softwar...