Since sensors do not have a sophisticated hardware archi-tecture or an operating system to manage code for safety, attacks injecting code to exploit memory-related vulnerabil-ities can present threats to sensor applications. In a sen-sor’s simple memory architecture, injected code can alter the control flow of a sensor application to either misuse ex-isting routines or download other malicious code to achieve attacks. To protect the control flow, this paper proposes a self-healing scheme that can detect attacks attempting to alter the control flow and then recover sensor applications to normal operations with minimum overhead. The self-healing scheme embeds diversified protection code at partic-ular locations to enforce access control in pr...
Complex computer systems are plagued with bugs and vulnerabilities. Worms such as SQL Slammer and hi...
In this paper, online system-level self-healing support is presented for embedded systems. Different...
With reference to sensor node architectures, we consider the problem of supporting forms of memory ...
We propose a new approach for reacting to a wide variety of software failures, ranging from remotely...
The security of low-end embedded systems became a very important topic as they are more connected an...
We propose a new approach for reacting to a wide variety of software failures, ranging from remotely...
Abstract. The introduction of self-healing capabilities to software systems could offer a way to alt...
Wireless Sensor Networks (WSNs) appeal to a wide range of applications that involve monitoring of va...
Most computer defense systems crash the process that they protect as part of their response to an at...
International audienceFault injection attacks have become a serious threat against embedded systems....
With reference to sensor node architectures, we consider the problem of supporting forms of memory p...
Most computer defense systems crash the process that they protect as part of their response to an at...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...
Complex computer systems are plagued with bugs and vulnerabilities. Worms such as SQL Slammer and hi...
In this paper, online system-level self-healing support is presented for embedded systems. Different...
With reference to sensor node architectures, we consider the problem of supporting forms of memory ...
We propose a new approach for reacting to a wide variety of software failures, ranging from remotely...
The security of low-end embedded systems became a very important topic as they are more connected an...
We propose a new approach for reacting to a wide variety of software failures, ranging from remotely...
Abstract. The introduction of self-healing capabilities to software systems could offer a way to alt...
Wireless Sensor Networks (WSNs) appeal to a wide range of applications that involve monitoring of va...
Most computer defense systems crash the process that they protect as part of their response to an at...
International audienceFault injection attacks have become a serious threat against embedded systems....
With reference to sensor node architectures, we consider the problem of supporting forms of memory p...
Most computer defense systems crash the process that they protect as part of their response to an at...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...
Complex computer systems are plagued with bugs and vulnerabilities. Worms such as SQL Slammer and hi...
In this paper, online system-level self-healing support is presented for embedded systems. Different...
With reference to sensor node architectures, we consider the problem of supporting forms of memory ...