相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。On Runtime Software Security of TrustZone-M Based IoT Devices
Lan Luo et al.
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2020)
μRAI: Securing Embedded Systems with Return Address Integrity
Naif Saleh Almakhdhub et al.
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)
Fast Execute-Only Memory for Embedded Systems
Zhuojia Shen et al.
2020 IEEE SECURE DEVELOPMENT (SECDEV 2020) (2020)
MARDU: Efficient and Scalable Code Re-randomization
Christopher Jelesnianski et al.
PROCEEDINGS OF THE 13TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE (SYSTOR 2020) (2020)
OAT: Attesting Operation Integrity of Embedded Devices
Zhichuang Sun et al.
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)
Compiler-assisted Code Randomization
Hyungjoon Koo et al.
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers
Thomas Nyman et al.
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017) (2017)
Return-Oriented Programming on a Cortex-M Processor
Nathanael R. Weidler et al.
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (2017)
RERANZ: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks
Zhe Wang et al.
ACM SIGPLAN NOTICES (2017)
REVARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications
Taegyu Kim et al.
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017) (2017)
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone
Le Guan et al.
MOBISYS'17: PROCEEDINGS OF THE 15TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES (2017)
Detecting ROP with Statistical Learning of Program Characteristics
Mohamed Elsabagh et al.
PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17) (2017)
Protecting Bare-metal Embedded Systems With Privilege Overlays
Abraham A. Clements et al.
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)
C-FLAT: Control-Flow Attestation for Embedded Systems Software
Tigist Abera et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
Hong Hu et al.
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)
Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement
Hyungjoon Koo et al.
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
Marlin: Mitigating Code Reuse Attacks Using Code Randomization
Aditi Gupta et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity
Isaac Evans et al.
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming
Lucas Davi et al.
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) (2015)
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Mauro Conti et al.
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)
Timely Rerandomization for Mitigating Memory Disclosures
David Bigelow et al.
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)
Hacking Blind
Andrea Bittau et al.
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014) (2014)
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization
Kevin Z. Snow et al.
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2013)
Return-Oriented Programming
Marco Prandini et al.
IEEE SECURITY & PRIVACY (2012)
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization
Vasilis Pappas et al.
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)
Control-Flow Integrity Principles, Implementations, and Applications
Martin Abadi et al.
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2009)