Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Sok: Runtime integrity
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Sok: Integrity, attestation, and auditing of program execution
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Your firmware has arrived: A study of firmware update vulnerabilities
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
On bridging the gap between control flow integrity and attestation schemes
Control-flow hijacking attacks are still a major challenge in software security. Several means
of protection and detection have been proposed but gaps still exist. To bridge such gaps …
of protection and detection have been proposed but gaps still exist. To bridge such gaps …
One for all and all for one: Gnn-based control-flow attestation for embedded devices
Control-Flow Attestation (CFA) is a security service that allows an entity (verifier) to verify the
integrity of code execution on a remote computer system (prover). Existing CFA schemes …
integrity of code execution on a remote computer system (prover). Existing CFA schemes …
Secure and timely gpu execution in cyber-physical systems
Graphics Processing Units (GPU) are increasingly deployed on Cyber-physical Systems
(CPSs), frequently used to perform real-time safety-critical functions, such as object …
(CPSs), frequently used to perform real-time safety-critical functions, such as object …
An empirical study of performance interference: Timing violation patterns and impacts
Multi-core platforms are becoming increasingly prevalent in cyber-physical systems such as
automobiles and robots. However, contention for shared resources makes it chal-lenging to …
automobiles and robots. However, contention for shared resources makes it chal-lenging to …
InsectACIDE: Debugger-based holistic asynchronous CFI for embedded system
Real-time and embedded systems are predominantly written in C, a language that is
notoriously not memory safe. This has led to widespread memory-corruption vulnerabilities …
notoriously not memory safe. This has led to widespread memory-corruption vulnerabilities …
Teamwork makes tee work: open and resilient remote attestation on decentralized trust
X Zhang, K Qin, S Qu, T Wang, C Zhang… - arxiv preprint arxiv …, 2024 - arxiv.org
Remote Attestation (RA) enables the integrity and authenticity of applications in Trusted
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …
Speccfa: Enhancing control flow attestation/auditing via application-aware sub-path speculation
At the edge of modern cyber-physical systems, Micro-Controller Units (MCUs) are
responsible for safety-critical sensing/actuation. However, MCU cost constraints rule out the …
responsible for safety-critical sensing/actuation. However, MCU cost constraints rule out the …