Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
Deep learning and big data technologies for IoT security
Technology has become inevitable in human life, especially the growth of Internet of Things
(IoT), which enables communication and interaction with various devices. However, IoT has …
(IoT), which enables communication and interaction with various devices. However, IoT has …
Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
Sok: Eternal war in memory
Memory corruption bugs in software written in low-level languages like C or C++ are one of
the oldest problems in computer security. The lack of safety in these languages allows …
the oldest problems in computer security. The lack of safety in these languages allows …
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
Fine-grained address space layout randomization (ASLR) has recently been proposed as a
method of efficiently mitigating runtime attacks. In this paper, we introduce the design and …
method of efficiently mitigating runtime attacks. In this paper, we introduce the design and …
SoK: Automated software diversity
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …
currently deployed defenses and the transition to online software distribution (the" App store" …
Jump-oriented programming: a new class of code-reuse attack
Return-oriented programming is an effective code-reuse attack in which short code
sequences ending in a ret instruction are found within existing binaries and executed in …
sequences ending in a ret instruction are found within existing binaries and executed in …
[PDF][PDF] Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software.
J Newsome, DX Song - NDSS, 2005 - Citeseer
Software vulnerabilities have had a devastating effect on the Internet. Worms such as
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …
On the effectiveness of address-space randomization
Address-space randomization is a technique used to fortify systems against buffer overflow
attacks. The idea is to introduce artificial diversity by randomizing the memory location of …
attacks. The idea is to introduce artificial diversity by randomizing the memory location of …
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
Unlike library code, whose instruction addresses can be randomized by address space
layout randomization (ASLR), application binary code often has static instruction addresses …
layout randomization (ASLR), application binary code often has static instruction addresses …