3.8 Proceedings Paper

HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Proceedings Paper Computer Science, Artificial Intelligence

On Runtime Software Security of TrustZone-M Based IoT Devices

Lan Luo et al.

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2020)

Proceedings Paper Computer Science, Information Systems

μRAI: Securing Embedded Systems with Return Address Integrity

Naif Saleh Almakhdhub et al.

27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)

Proceedings Paper Computer Science, Theory & Methods

Fast Execute-Only Memory for Embedded Systems

Zhuojia Shen et al.

2020 IEEE SECURE DEVELOPMENT (SECDEV 2020) (2020)

Proceedings Paper Computer Science, Hardware & Architecture

MARDU: Efficient and Scalable Code Re-randomization

Christopher Jelesnianski et al.

PROCEEDINGS OF THE 13TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE (SYSTOR 2020) (2020)

Proceedings Paper Computer Science, Information Systems

OAT: Attesting Operation Integrity of Embedded Devices

Zhichuang Sun et al.

2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)

Proceedings Paper Computer Science, Theory & Methods

Compiler-assisted Code Randomization

Hyungjoon Koo et al.

2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)

Proceedings Paper Computer Science, Software Engineering

CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers

Thomas Nyman et al.

RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017) (2017)

Proceedings Paper Computer Science, Information Systems

Return-Oriented Programming on a Cortex-M Processor

Nathanael R. Weidler et al.

2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (2017)

Proceedings Paper Computer Science, Software Engineering

RERANZ: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks

Zhe Wang et al.

ACM SIGPLAN NOTICES (2017)

Proceedings Paper Computer Science, Information Systems

REVARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications

Taegyu Kim et al.

33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017) (2017)

Proceedings Paper Computer Science, Theory & Methods

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone

Le Guan et al.

MOBISYS'17: PROCEEDINGS OF THE 15TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES (2017)

Proceedings Paper Computer Science, Information Systems

Detecting ROP with Statistical Learning of Program Characteristics

Mohamed Elsabagh et al.

PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17) (2017)

Proceedings Paper Computer Science, Information Systems

Protecting Bare-metal Embedded Systems With Privilege Overlays

Abraham A. Clements et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Proceedings Paper Computer Science, Information Systems

C-FLAT: Control-Flow Attestation for Embedded Systems Software

Tigist Abera et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Theory & Methods

Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks

Hong Hu et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)

Proceedings Paper Computer Science, Information Systems

Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement

Hyungjoon Koo et al.

ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Hardware & Architecture

Marlin: Mitigating Code Reuse Attacks Using Code Randomization

Aditi Gupta et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Proceedings Paper Computer Science, Information Systems

Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity

Isaac Evans et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Proceedings Paper Computer Science, Information Systems

Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming

Lucas Davi et al.

22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) (2015)

Proceedings Paper Computer Science, Information Systems

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks

Mauro Conti et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Proceedings Paper Computer Science, Information Systems

Timely Rerandomization for Mitigating Memory Disclosures

David Bigelow et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Proceedings Paper Computer Science, Information Systems

Hacking Blind

Andrea Bittau et al.

2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014) (2014)

Proceedings Paper Computer Science, Theory & Methods

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization

Kevin Z. Snow et al.

2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2013)

Article Computer Science, Information Systems

Return-Oriented Programming

Marco Prandini et al.

IEEE SECURITY & PRIVACY (2012)

Proceedings Paper Computer Science, Theory & Methods

Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization

Vasilis Pappas et al.

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)

Article Computer Science, Information Systems

Control-Flow Integrity Principles, Implementations, and Applications

Martin Abadi et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2009)