3.8 Proceedings Paper

fASLR: Function-Based ASLR for Resource-Constrained IoT Systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Proceedings Paper Computer Science, Information Systems

HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers

Jiameng Shi et al.

Summary: Microcontroller-based embedded systems are widely used in IoT technology, and their security is crucial. However, MCU devices are vulnerable to code reuse attacks. This study proposes the HARM system, the first solution for ARM-based MCUs, which proactively triggers non-bypassable randomization to effectively prevent code reuse attacks while maintaining low performance and energy overhead.

2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022) (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency

Feng Xuewei et al.

2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) (2020)

Proceedings Paper Computer Science, Theory & Methods

Compiler-assisted Code Randomization

Hyungjoon Koo et al.

2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)

Proceedings Paper Computer Science, Information Systems

Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming

Lucas Davi et al.

22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) (2015)

Proceedings Paper Computer Science, Theory & Methods

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization

Kevin Z. Snow et al.

2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2013)

Proceedings Paper Computer Science, Theory & Methods

ILR: Where'd My Gadgets Go?

Jason Hiser et al.

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)

Article Computer Science, Information Systems

Extraction of forensically sensitive information from windows physical memory

S. M. Hejazi et al.

DIGITAL INVESTIGATION (2009)