A fine-grained control flow integrity approach against runtime memory attacks for embedded systems

S Das, W Zhang, Y Liu - … on Very Large Scale Integration (VLSI …, 2016 - ieeexplore.ieee.org
Runtime attacks on memory, such as buffer overflow based stack smashing and code reuse
attacks, are common in embedded systems. Control flow integrity (CFI) has been …

A taxonomy of software integrity protection techniques

M Ahmadvand, A Pretschner, F Kelbert - Advances in Computers, 2019 - Elsevier
Tampering with software by man-at-the-end (MATE) attackers is an attack that can lead to
security circumvention, privacy violation, reputation damage, and revenue loss. In this …

TZ‐MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone

Z Wang, Y Zhuang, Z Yan - Security and Communication …, 2020 - Wiley Online Library
With the widespread use of mobile embedded devices in the Internet of Things, mobile
office, and edge computing, security issues are becoming more and more serious. Remote …

CUDA leaks: Information leakage in GPU architectures

R Di Pietro, F Lombardi, A Villani - arXiv preprint arXiv:1305.7383, 2013 - arxiv.org
Graphics Processing Units (GPUs) are deployed on most present server, desktop, and even
mobile platforms. Nowadays, a growing number of applications leverage the high …

Control-Flow Checking Using Branch Sequence Signatures

L Liu, L Ci, W Liu, C Bin - … on Internet of Things (iThings) and …, 2016 - ieeexplore.ieee.org
Dynamic checking the integrity of software at run-time is always a hot and difficult spot for
trusted computing. In this paper we present a lightweight approach, Control-flow checking …

Controlling your control flow graph

A Kanuparthi, J Rajendran… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Code Reuse Attacks (CRAs) are software exploits in which an attacker directs program
control flow through existing code without injecting malicious code to achieve his objective …

Reconfigurable dynamic trusted platform module for control flow checking

S Das, W Zhang, Y Liu - 2014 IEEE Computer Society Annual …, 2014 - ieeexplore.ieee.org
Trusted Platform Module (TPM) has gained its popularity in computing systems as a
hardware security approach. TPM provides the boot time security by verifying the platform …

A metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors

H Oh, Y Cho, Y Paek - The Journal of Supercomputing, 2021 - Springer
In recent years, there is a growing need to protect security and privacy of the data against
various attacks on software running on smart mobile devices. As of today, the code-reuse …

[PDF][PDF] A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems.

X Wang, W Wang, B Xu, P Du, L Li, M Liu - J. Univers. Comput. Sci., 2018 - muyang.me
Embedded systems are subjected to various adversaries including software attacks,
physical attacks, and side channel attacks. Most of these malicious attacks can lead to the …

Software-design for internal security checks with dynamic integrity measurement (DIM)

KO Detken, M Jahnke, T Rix… - 2017 9th IEEE …, 2017 - ieeexplore.ieee.org
Most security software tools try to detect malicious components by cryptographic hashes,
signatures or based on their behavior. The former, is a widely adopted approach based on …