Security and privacy for low power iot devices on 5g and beyond networks: Challenges and future directions

J Cook, SU Rehman, MA Khan - IEEE Access, 2023 - ieeexplore.ieee.org
The growth in the use of small sensor devices, commonly known as the Internet of Things
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …

[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

SoK: Automated software diversity

P Larsen, A Homescu, S Brunthaler… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …

From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation

F Araujo, KW Hamlen, S Biedermann… - Proceedings of the …, 2014 - dl.acm.org
Traditional software security patches often have the unfortunate side-effect of quickly alerting
attackers that their attempts to exploit patched vulnerabilities have failed. Attackers greatly …

PatchScope: Memory object centric patch diffing

L Zhao, Y Zhu, J Ming, Y Zhang, H Zhang… - Proceedings of the 2020 …, 2020 - dl.acm.org
Software patching is one of the most significant mechanisms to combat vulnerabilities. To
demystify underlying patch details, the techniques of patch differential analysis (aka patch …

Security through diversity: Are we there yet?

P Larsen, S Brunthaler, M Franz - IEEE Security & Privacy, 2013 - ieeexplore.ieee.org
Because most software attacks rely on predictable behavior on the target platform, mass
distribution of identical software facilitates mass exploitation. Countermeasures include …

Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems

M Moore, TK Kuppusamy, J Cappos - Proceedings of the 39th Annual …, 2023 - dl.acm.org
Modern software installation tools often use packages from more than one repository,
presenting a unique set of security challenges. Such a configuration increases the risk of …

Feedback-driven binary code diversification

B Coppens, B De Sutter, J Maebe - ACM Transactions on Architecture …, 2013 - dl.acm.org
As described in many blog posts and in the scientific literature, exploits for software
vulnerabilities are often engineered on the basis of patches. For example,“Microsoft Patch …

Software protection with code mobility

A Cabutto, P Falcarin, B Abrath, B Coppens… - Proceedings of the …, 2015 - dl.acm.org
The analysis of binary code is a common step of Man-At-The-End attacks to identify code
sections crucial to implement attacks, such as identifying private key hidden in the code …

Evaluation methodologies in software protection research

B De Sutter, S Schrittwieser, B Coppens… - arxiv preprint arxiv …, 2023 - arxiv.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …