Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Fostering collaboration among CPS professionals in academia, government, and industry

CPS-VO

memory vulnerabilities

biblio

Visible to the public Hardware-Based Adversary-Controlled States Tracking

Submitted by aekwall on Mon, 10/14/2019 - 9:20am
  • classic dynamic taint analysis method
  • code-reuse attack
  • composability
  • control flow
  • dynimic taint analysis
  • Hardware
  • Hardware-based Adversary-controlled States
  • HAST
  • Human behavior
  • Linux
  • Linux applications
  • memory data
  • memory vulnerabilities
  • Pipelines
  • program diagnostics
  • programming
  • pubcrawl
  • Registers
  • Resiliency
  • return oriented programming
  • rop attacks
  • Scalability
  • security of data
  • Software
  • software security challenges
  • target tracking

Terms of Use  |  ©2021. CPS-VO