Zobrazeno 1 - 10
of 409
pro vyhledávání: '"Control-flow integrity"'
Autor:
Hyerean Jang, Youngjoo Shin
Publikováno v:
IEEE Access, Vol 11, Pp 138699-138711 (2023)
Spectre attack exploits the vulnerability in speculative execution, an optimization technique for modern superscalar processors. Among the attack variants, Spectre-BTB and Spectre-RSB are the most threatening because they allow adversaries to execute
Externí odkaz:
https://doaj.org/article/45ab3ba1d10c443f8553dbf6743e7094
Publikováno v:
IEEE Access, Vol 11, Pp 133255-133280 (2023)
Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to manipulate the standard program execution path, resulting in abnormal processor behaviors. In response to the security concern, proposals for Control Flow I
Externí odkaz:
https://doaj.org/article/e6092230d19f46cd96a81a9fb2a56ee4
Autor:
Moon Chan Park, Dong Hoon Lee
Publikováno v:
IEEE Access, Vol 11, Pp 4291-4305 (2023)
Control-flow integrity (CFI) is considered a principled mitigation against control-flow hijacking even under the most powerful attacker who can arbitrarily write and read memory. However, existing schemes still demonstrated limitations in either guar
Externí odkaz:
https://doaj.org/article/e4e65d5f3cc248ecb0e529282322af8c
Publikováno v:
网络与信息安全学报, Vol 8, Pp 15-29 (2022)
Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network securit
Externí odkaz:
https://doaj.org/article/8d5b6cc91eb346e3aa80550ecc32149b
Publikováno v:
网络与信息安全学报, Vol 8, Iss 1, Pp 15-29 (2022)
Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security. Tra
Externí odkaz:
https://doaj.org/article/887fef29ff054001b2d17b454f460d7c
Publikováno v:
IEEE Access, Vol 10, Pp 132675-132684 (2022)
Embedded systems are deployed in many fields, from industrial applications to personal products. However, there are growing concerns regarding the security of these embedded systems as the number of attacks targeting them has increased. Control flow
Externí odkaz:
https://doaj.org/article/065360bcd1714e999cb31afe55dc3109
Autor:
Zhilong Wang, Peng Liu
Publikováno v:
Cybersecurity, Vol 4, Iss 1, Pp 1-9 (2021)
Abstract Performance/security trade-off is widely noticed in CFI research, however, we observe that not every CFI scheme is subject to the trade-off. Motivated by the key observation, we ask three questions: ➊ does trade-off really exist in differe
Externí odkaz:
https://doaj.org/article/5c11b0acce844ccbbb87a35a79c120b7
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Micromachines, Vol 14, Iss 8, p 1525 (2023)
The growing prevalence of embedded systems in various applications has raised concerns about their vulnerability to malicious code reuse attacks. Current software-based and hardware-assisted security techniques struggle to detect or block these attac
Externí odkaz:
https://doaj.org/article/1c7261914ef04ea181e51fa9e680d70e
Autor:
Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou
Publikováno v:
Cybersecurity, Vol 3, Iss 1, Pp 1-32 (2020)
Abstract Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community. Th
Externí odkaz:
https://doaj.org/article/80d906d200a54577a5f73e5162fe53c6