PROLEPSIS: Binary analysis and instrumentation of IoT software for control-flow integrity

被引:0
|
作者
Forte, Valentina [1 ]
Maunero, Nicolo [1 ]
Prinetto, Paolo [1 ]
Roascio, Gianluca [1 ]
机构
[1] Cybersecurity National Lab., Politecnico di Torino, Turin, Italy
关键词
722.3 Data Communication; Equipment and Techniques - 723 Computer Software; Data Handling and Applications - 723.2 Data Processing and Image Processing;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of things
引用
收藏
相关论文
共 50 条
  • [21] Per-Input Control-Flow Integrity
    Niu, Ben
    Tan, Gang
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 914 - 926
  • [22] PCFIRE: Towards Provable Preventative Control-Flow Integrity Enforcement for Realistic Embedded Software
    Tan, Jiaqi
    Tay, Hui Jun
    Drolia, Utsav
    Gandhi, Rajeev
    Narasimhan, Priya
    2016 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE (EMSOFT), 2016,
  • [23] Real-Time Control-Flow Integrity for Multicore Mixed-Criticality IoT Systems
    Eftekhari Moghadam, Vahid
    Prinetto, Paolo
    Roascio, Gianluca
    2022 IEEE EUROPEAN TEST SYMPOSIUM (ETS 2022), 2022,
  • [24] Control-Flow Integrity: Precision, Security, and Performance
    Burow, Nathan
    Carr, Scott A.
    Nash, Joseph
    Larsen, Per
    Franz, Michael
    Brunthaler, Stefan
    Payer, Mathias
    ACM COMPUTING SURVEYS, 2017, 50 (01)
  • [25] CFG Construction Soundness in Control-Flow Integrity
    Tan, Gang
    Jaeger, Trent
    PROCEEDINGS OF THE 2017 WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS' 17), 2017, : 3 - 13
  • [26] A Security Analysis of Labeling-Based Control-Flow Integrity Schemes
    Demicco, David
    Cole, Matthew
    Wang, Shengdun
    Prakash, Aravind
    2022 IEEE 29TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING, DATA AND ANALYTICS WORKSHOP, HIPCW, 2022, : 47 - 52
  • [27] Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity
    Shanbhogue, Vedvyas
    Gupta, Deepak
    Sahita, Ravi
    PROCEEDINGS OF THE 8TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP '19, 2019,
  • [28] HCFI: Hardware-enforced Control-Flow Integrity
    Christoulakis, Nick
    Christou, George
    Athanasopoulos, Elias
    Ioannidis, Sotiris
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 38 - 49
  • [29] Renewable Just-In-Time Control-Flow Integrity
    Bauman, Erick
    Duan, Jun
    Hamlen, Kevin W.
    Lin, Zhiqiang
    PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 580 - 594
  • [30] Combining Control-Flow Integrity and Static Analysis for Efficient and Validated Data Sandboxing
    Zeng, Bin
    Tan, Gang
    Morrisett, Greg
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 29 - 39