The adoption of WebAssembly has rapidly increased in the last few years as it provides a fast and safe model for program execution. However, WebAssembly is not exempt from …
We present a control-theoretic approach to achieve Cyber-Physical Systems (CPS) resilient designs. We assume situations in which the CPS must maintain the correct operation of a set …
N Ahmed, B Bhargava - IEEE Transactions on Cloud …, 2020 - ieeexplore.ieee.org
Studies on resiliency against system attacks have contributed well established defensive techniques, sound protocols and paradigms in distributed systems' literature. One of this …
A promising avenue for improving the effectiveness of behavioral-based malware detectors is to leverage two-phase detection mechanisms. Existing problem in two-phase detection is …
Methods, systems, and computer readable media for pre venting code reuse attacks are disclosed. According to one method, the method includes executing, on a processor, code in …
Software protection aims at safeguarding assets embedded in software by preventing and delaying reverse engineering and tampering attacks. This article presents an architecture …
AB Sarr, AH Anwar, C Kamhoua… - … 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
In this paper, we propose a cyber deception approach using software diversity in a honeynet. Honeypot allocation is used as an active cyber deception technique to increase …
X Feng, D Wang, Z Lin, X Kuang… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Code randomization is considered as the basis of mitigation against code reuse attacks, fundamentally supporting some recent proposals such as execute-only memory (XOM) that …