Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

Deep learning and big data technologies for IoT security

MA Amanullah, RAA Habeeb, FH Nasaruddin… - Computer …, 2020 - Elsevier
Technology has become inevitable in human life, especially the growth of Internet of Things
(IoT), which enables communication and interaction with various devices. However, IoT has …

Toward proactive, adaptive defense: A survey on moving target defense

JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …

Sok: Eternal war in memory

L Szekeres, M Payer, T Wei… - 2013 IEEE Symposium on …, 2013 - ieeexplore.ieee.org
Memory corruption bugs in software written in low-level languages like C or C++ are one of
the oldest problems in computer security. The lack of safety in these languages allows …

Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization

KZ Snow, F Monrose, L Davi… - … IEEE symposium on …, 2013 - ieeexplore.ieee.org
Fine-grained address space layout randomization (ASLR) has recently been proposed as a
method of efficiently mitigating runtime attacks. In this paper, we introduce the design and …

SoK: Automated software diversity

P Larsen, A Homescu, S Brunthaler… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …

Jump-oriented programming: a new class of code-reuse attack

T Bletsch, X Jiang, VW Freeh, Z Liang - … of the 6th ACM symposium on …, 2011 - dl.acm.org
Return-oriented programming is an effective code-reuse attack in which short code
sequences ending in a ret instruction are found within existing binaries and executed in …

[PDF][PDF] Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software.

J Newsome, DX Song - NDSS, 2005 - Citeseer
Software vulnerabilities have had a devastating effect on the Internet. Worms such as
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …

On the effectiveness of address-space randomization

H Shacham, M Page, B Pfaff, EJ Goh… - Proceedings of the 11th …, 2004 - dl.acm.org
Address-space randomization is a technique used to fortify systems against buffer overflow
attacks. The idea is to introduce artificial diversity by randomizing the memory location of …

Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code

R Wartell, V Mohan, KW Hamlen, Z Lin - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Unlike library code, whose instruction addresses can be randomized by address space
layout randomization (ASLR), application binary code often has static instruction addresses …