Weird machines, exploitability, and provable unexploitability

T Dullien - IEEE Transactions on Emerging Topics in …, 2017 - ieeexplore.ieee.org
The concept of exploit is central to computer security, particularly in the context of memory
corruptions. Yet, in spite of the centrality of the concept and voluminous descriptions of …

[图书][B] Digitale Souveränität

MC Wolff - 2022 - nomos-elibrary.de
Die vorliegende Studie erweitert die Theorie der Souveränität um die Dimension der
Digitalisierung. Dazu verbindet sie klassische Herrschaftstheorien mit einer technologischen …

Offensive cyber capabilities

JD Work - Research Handbook on Cyberwarfare, 2024 - elgaronline.com
The study of capabilities to conduct cyber operations poses key, and often most challenging,
problems for those involved in cyber conflict research. No other warfighting domain faces …

[PDF][PDF] Identifying & addressing challenges in embedded binary security

S Etalle, A Abbasi - 2017 - informatieprofessional.nl
Embedded systems are found everywhere from consumer electronics to critical
infrastructure. And with the growth of the Internet of Things (IoT), these systems are …

[PDF][PDF] Identifying & addressing challenges in embedded binary security

A Wetzels - 2017 - core.ac.uk
Embedded systems are found everywhere from consumer electronics to critical
infrastructure. And with the growth of the Internet of Things (IoT), these systems are …