Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
return oriented programming
biblio
Let's Shock Our IoT's Heart: ARMv7-M Under (Fault) Attacks
Submitted by
grigby1
on Mon, 11/04/2019 - 11:35am
Backdoor
buffer overflow
composability
Electromagnetic Fault Injection (EMFI)
Fault injection
Human behavior
Human Factors
microcontroller
physical attacks
pubcrawl
resilience
Resiliency
return oriented programming
rop attacks
Scalability
Vulnerability Insertion
biblio
Using Hardware Performance Counters to Detect Control Hijacking Attacks
Submitted by
aekwall
on Mon, 10/14/2019 - 9:21am
Scalability
security
Resiliency
Human behavior
pubcrawl
composability
return oriented programming
Attack detection
Hardware performance counters
malicious code execution
biblio
Spectre Attacks: Exploiting Speculative Execution
Submitted by
aekwall
on Mon, 10/14/2019 - 9:20am
Scalability
Hardware
Program processors
Resiliency
Human behavior
pubcrawl
composability
Transient analysis
return oriented programming
Registers
microarchitecture
arrays
microarchitectural-attack
microarchitecture-security
side-channel attacks
Spectre
speculative-execution
biblio
ROPMate: Visually Assisting the Creation of ROP-based Exploits
Submitted by
aekwall
on Mon, 10/14/2019 - 9:20am
Buildings
code reuse
composability
data analysis
data visualisation
Human behavior
Malware Analysis
program testing
programming
pubcrawl
Registers
Resiliency
return oriented programming
return-oriented programming
rop attacks
ROP chains
ROP Exploits
ROP-based attacks
ROP-based exploits
ROPMate
Scalability
security
security of data
semantically correct chains
semantically meaningful gadgets
software reliability
Task Analysis
tools
visual aids
visual analytics
visual analytics system
biblio
Hardware-Based Adversary-Controlled States Tracking
Submitted by
aekwall
on Mon, 10/14/2019 - 9:20am
classic dynamic taint analysis method
code-reuse attack
composability
control flow
dynimic taint analysis
Hardware
Hardware-based Adversary-controlled States
HAST
Human behavior
Linux
Linux applications
memory data
memory vulnerabilities
Pipelines
program diagnostics
programming
pubcrawl
Registers
Resiliency
return oriented programming
rop attacks
Scalability
security of data
Software
software security challenges
target tracking
biblio
Multilayer ROP Protection Via Microarchitectural Units Available in Commodity Hardware
Submitted by
aekwall
on Mon, 10/14/2019 - 9:20am
architecture
Benchmark testing
CFI
commodity hardware
composability
computer architecture
Hardware
Human behavior
layers
LBR
lightweight security techniques
microarchitectural units
microarchitecture
multilayer protection approach
multilayer ROP protection
multilayer system
Nonhomogeneous media
Program processors
pubcrawl
RAS
Resiliency
return oriented programming
Return-oriented Programming attacks
ROP
rop attacks
Runtime
Scalability
security of data
Web browsers
biblio
Compiler-Assisted Code Randomization
Submitted by
aekwall
on Mon, 10/14/2019 - 9:20am
address space layout randomization
applied code transformation
CCR
code randomization
code uniformity
compiler level protection
compiler-assisted code randomization
compiler-rewriter cooperation
compiler security
composability
Compositionality
fine-grained code randomization
fine-grained code transformation
Hardware
Human behavior
LLVM compiler toolchain
metadata
Metrics
program compilers
Prototypes
pubcrawl
randomized variants
Resiliency
return oriented programming
return-oriented programming
Robustness
Runtime
Scalability
security
security of data
Software
software distribution models
software distribution norms
software diversification
software engineering
transformation-assisting metadata
biblio
Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks
Submitted by
aekwall
on Mon, 10/14/2019 - 9:20am
binary instrumentation
calling convention
code reuse attack
composability
Human behavior
Instruction sets
Kernel
Linux
malware
object-oriented programming
parameter registers
programming
pubcrawl
Registers
Resiliency
return instructions
return oriented programming
Return-oriented Programming attacks
ROP attack
rop attacks
ROP malicious code
Scalability
scratch register
scratch registers
security
security of data
Task Analysis
W ⊕ X security model
x64-based Linux platform
biblio
PMU-extended Hardware ROP Attack Detection
Submitted by
aekwall
on Mon, 10/14/2019 - 9:19am
arbitrary code execution
composability
Control Flow Integrity
data execution prevention mechanism
Human behavior
low-cost hardware ROP detection approach
object-oriented programming
performance monitoring unit
PMU-extended hardware ROP attack detection
pubcrawl
Resiliency
return oriented programming
rop attacks
Scalability
security of data
short instruction sequences
software security
biblio
Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications
Submitted by
aekwall
on Mon, 10/14/2019 - 9:19am
security of data
Scalability
Servers
Conferences
security
Linux
Resiliency
Human behavior
pubcrawl
composability
privacy
tools
address space layout randomization
ASLR
C Applications
C languages
C program
CFI
coarse-grained CFI
coarse-grained control-flow integrity
code injection attacks
code reuse attack
code reuse attacks
Control-hijacking attacks
COOP
Counterfeit Object-oriented Programming
data-execution prevention
DEP
existing function
fine-grained CFI technologies
FOP
FOP attack
FOP gadgets
function-oriented programming
JOP
Jump-Oriented Programming
Layout
Linux x64 environment
malicious program behavior
object-oriented programming
proftpd1.3.0 server
return-oriented programming
ROP
shadow stack technology
return oriented programming
1
2
3
next ›
last »