[HTML][HTML] A Segmented Stack Randomization for bare-metal IoT devices

J Jung, BS Kim, H Son, D Jang, B Lee, J Cho - Computers & Security, 2025 - Elsevier
Bare-metal IoT devices, lacking memory management features such as virtual memory and
Memory Management Units (MMUs), are increasingly vulnerable to memory corruption …

Control-flow integrity at risc: Attacking risc-v by jump-oriented programming

O Gilles, F Viguier, N Kosmatov, DG Pérez - arXiv preprint arXiv …, 2022 - arxiv.org
RISC-V is an open instruction set architecture recently developed for embedded real-time
systems. To achieve a lasting security on these systems and design efficient …

Execution at RISC: Stealth JOP Attacks on RISC-V Applications

L Buckwell, O Gilles, DG Pérez, N Kosmatov - European Symposium on …, 2023 - Springer
RISC-V is a recently developed open instruction set architecture gaining a lot of attention. To
improve the security of these systems and design efficient countermeasures, a better …

Heap Vulnerability Exploitation Techniques on the Linux Platform: An Overview

S Du, Z Li, J Li - 2024 9th International Conference on Signal …, 2024 - ieeexplore.ieee.org
Heap vulnerability exploitation involves utilizing the inherent weaknesses in the heap
memory manager's internal mechanisms, enabling the allocation and deallocation of …

[PDF][PDF] Execution at RISC: Stealth JOP Attacks on RISC-V Applications

DG Pérez, N Kosmatov - nikolai-kosmatov.eu
RISC-V is a recently developed open instruction set architecture gaining a lot of attention. To
improve the security of these systems and design e cient countermeasures, a better …