Zobrazeno 1 - 10
of 1 108
pro vyhledávání: '"Code reuse attacks"'
Cryptographic libraries, an essential part of cybersecurity, are shown to be susceptible to different types of attacks, including side-channel and memory-corruption attacks. In this article, we examine popular cryptographic libraries in terms of the
Externí odkaz:
http://arxiv.org/abs/2412.19310
Code-reuse attacks have become a kind of common attack method, in which attackers use the existing code in the program to hijack the control flow. Most existing defenses focus on control flow integrity (CFI), code randomization, and software debloati
Externí odkaz:
http://arxiv.org/abs/2303.12612
Modern software deployment process produces software that is uniform, and hence vulnerable to large-scale code-reuse attacks. Compiler-based diversification improves the resilience and security of software systems by automatically generating differen
Externí odkaz:
http://arxiv.org/abs/2007.08955
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Micromachines, Vol 14, Iss 8, p 1525 (2023)
The growing prevalence of embedded systems in various applications has raised concerns about their vulnerability to malicious code reuse attacks. Current software-based and hardware-assisted security techniques struggle to detect or block these attac
Externí odkaz:
https://doaj.org/article/1c7261914ef04ea181e51fa9e680d70e
Autor:
Jun-Won Ho
Publikováno v:
IEEE Access, Vol 6, Pp 54343-54354 (2018)
Industrial IoT devices are vulnerable to code-reuse attacks in which benign codes of these devices are reused for malicious activities. In the sense that adversary can compromise industrial IoT devices by means of code-reuse attacks and impair entire
Externí odkaz:
https://doaj.org/article/410611f965d64e88bd626121dbce22f8
Autor:
Follner, Andreas, Bodden, Eric
Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years. Researchers have answered the threat with various mitigation techniques, but nevertheless, new
Externí odkaz:
http://arxiv.org/abs/1504.02288
Autor:
Oh, Hyunyoung1 (AUTHOR), Cho, Yeongpil2 (AUTHOR) ypcho@hanyang.ac.kr, Paek, Yunheung1 (AUTHOR) ypaek@snu.ac.kr
Publikováno v:
Journal of Supercomputing. Jul2021, Vol. 77 Issue 7, p7287-7314. 28p.