Tag: Tagged architecture guide
Software security defenses are routinely broken by the persistence of both security
researchers and attackers. Hardware solutions based on tagging are emerging as a …
researchers and attackers. Hardware solutions based on tagging are emerging as a …
[PDF][PDF] Cross-Language Attacks.
Memory corruption attacks against unsafe programming languages like C/C++ have been a
major threat to computer systems for multiple decades. Various sanitizers and runtime …
major threat to computer systems for multiple decades. Various sanitizers and runtime …
Speculative probing: Hacking blind in the Spectre era
To defeat ASLR or more advanced fine-grained and leakage-resistant code randomization
schemes, modern software exploits rely on information disclosure to locate gadgets inside …
schemes, modern software exploits rely on information disclosure to locate gadgets inside …
[PDF][PDF] RAI: Securing Embedded Systems with Return Address Integrity
NS Almakhdhub, AA Clements, S Bagchi… - Network and Distributed …, 2020 - par.nsf.gov
Embedded systems are deployed in security critical environments and have become a
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …
Compiler-assisted code randomization
Despite decades of research on software diversification, only address space layout
randomization has seen widespread adoption. Code randomization, an effective defense …
randomization has seen widespread adoption. Code randomization, an effective defense …
The dynamics of innocent flesh on the bone: Code reuse ten years later
In 2007, Shacham published a seminal paper on Return-Oriented Programming (ROP), the
first systematic formulation of code reuse. The paper has been highly influential, profoundly …
first systematic formulation of code reuse. The paper has been highly influential, profoundly …
Using deep learning to solve computer security challenges: a survey
Although using machine learning techniques to solve computer security challenges is not a
new idea, the rapidly emerging Deep Learning technology has recently triggered a …
new idea, the rapidly emerging Deep Learning technology has recently triggered a …
Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology
S Li, W Wang, W Li, D Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to
manipulate the standard program execution path, resulting in abnormal processor …
manipulate the standard program execution path, resulting in abnormal processor …
[PDF][PDF] Survey of cyber moving targets second edition
This survey provides an overview of different cyber moving-target techniques, their threat
models, and their technical details. A cyber moving-target technique refers to any technique …
models, and their technical details. A cyber moving-target technique refers to any technique …
FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …