Attestation in wireless sensor networks: A survey

RV Steiner, E Lupu - ACM Computing Surveys (CSUR), 2016‏ - dl.acm.org
Attestation is a mechanism used by a trusted entity to validate the software integrity of an
untrusted platform. Over the past few years, several attestation techniques have been …

Securely Sharing Randomized Code That Flies

C Jelesnianski, J Yom, C Min, Y Jang - Digital Threats: Research and …, 2022‏ - dl.acm.org
Address space layout randomization was a great role model, being a light-weight defense
technique that could prevent early return-oriented programming attacks. Simple yet effective …

Practical Exploit Mitigation Design Against Code Re-Use and System Call Abuse Attacks

CS Jelesnianski - 2023‏ - vtechworks.lib.vt.edu
Over the years, many defense techniques have been proposed by the security community.
Even so, few have been adopted by the general public and deployed in production. This …