Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted data centers; hence, the confidentiality and integrity of the code and data are of paramount …
S Li, W Wang, W Li, D Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to manipulate the standard program execution path, resulting in abnormal processor …
Code tampering is serious issue in Internet of Things (IOT). IoT devices are used to collect environment data like temperature value, light intensity, hart pulse etc. Once an IoT device …
Y Yu, GP Liu, W Hu - ISA transactions, 2022 - Elsevier
This paper is concerned with the security tracking problem under the quadratic cost criterion for a class of discrete-time stochastic linear networked control systems (NCSs) exposed to …
J Zhang, B Qi, Z Qin, G Qu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Recently, code reuse attacks (CRAs), such as return-oriented programming (ROP) and jump- oriented programming (JOP), have emerged as a new class of ingenious security threats …
RT Gollapudi, G Yuksek, D Demicco… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Control flow attacks exploit software vulnerabilities to divert the flow of control into unintended paths to ultimately execute attack code. This paper explores the use of …
Y Wang, J Wu, T Yue, Z Ning, F Zhang - Proceedings of the 15th …, 2022 - dl.acm.org
Memory-corruption-based return address hijacking, such as Return-oriented Programming (ROP), is a prevalent attack technique that compromises the program's control flow integrity …
Z An, W Wang, W Li, S Li, D Zhang - Micromachines, 2023 - mdpi.com
The growing prevalence of embedded systems in various applications has raised concerns about their vulnerability to malicious code reuse attacks. Current software-based and …
Code-reuse attack is a concrete threat to computing systems because it can evade conventional security defenses. Control flow integrity (CFI) is proposed to repel this threat …