Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks

L Cheng, K Tian, D Yao - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
Recent studies have revealed that control programs running on embedded devices suffer
from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …

[图书][B] Anomaly detection as a service: challenges, advances, and opportunities

Anomaly detection has been a long-standing security approach with versatile applications,
ranging from securing server programs in critical environments, to detecting insider threats …

Checking is believing: Event-aware program anomaly detection in cyber-physical systems

L Cheng, K Tian, DD Yao, L Sha… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Securing cyber-physical systems (CPS) against malicious attacks is of paramount
importance because these attacks may cause irreparable damages to physical systems …

Prolepsis: Binary analysis and instrumentation of iot software for control-flow integrity

V Forte, N Maunero, P Prinetto… - … Conference on Electrical …, 2021 - ieeexplore.ieee.org
Nowadays, the growing pervasiveness of digital components and their interconnection in the
so-called Internet of Things, raises serious questions regarding security and integrity not …

LiFi-CFI: Light-weight Fine-grained Hardware CFI Protection for RISC-V

MS Roodsari, F Sheikhshoaei… - … on Design, Test and …, 2023 - ieeexplore.ieee.org
In today's open-source industry, RISC-V based embedded devices are used in various
applications where security is critical. RISC-V processors are vulnerable to many runtime …

Program anomaly detection against data-oriented attacks

L Cheng - 2018 - vtechworks.lib.vt.edu
Memory-corruption vulnerability is one of the most common attack vectors used to
compromise computer systems. Such vulnerabilities could lead to serious security problems …

BUFS: Towards bottom-up foundational security for software in the Internet-of-Things

J Tan, R Gandhi, P Narasimhan - 2016 IEEE/ACM Symposium …, 2016 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is a rapidly growing phenomenon. While IoT-enabled objects
can provide rich features that can improve users' lives, security failures can lead to severe …

AUSPICE-R: Automatic Safety-Property Proofs for Realistic Features in Machine Code

J Tan, HJ Tay, R Gandhi, P Narasimhan - Asian Symposium on …, 2016 - Springer
Automatically generating proofs of safety properties for software is important as software
becomes safety-critical, eg, in medical devices and automobiles. While current techniques …

Prescriptive Safety-Checks through Automated Proofs for Control-Flow Integrity

J Tan - 2016 - search.proquest.com
Embedded software today is pervasive: they can be found everywhere, from coffee makers
and medical devices, to cars and aircraft. Embedded software today is also open and …