Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks

L Cheng, K Tian, D Yao - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
Recent studies have revealed that control programs running on embedded devices suffer
from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …

[图书][B] Anomaly detection as a service: challenges, advances, and opportunities

Anomaly detection has been a long-standing security approach with versatile applications,
ranging from securing server programs in critical environments, to detecting insider threats …

Checking is believing: Event-aware program anomaly detection in cyber-physical systems

L Cheng, K Tian, DD Yao, L Sha… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Securing cyber-physical systems (CPS) against malicious attacks is of paramount
importance because these attacks may cause irreparable damages to physical systems …

Time and sequence integrated runtime anomaly detection for embedded systems

S Lu, R Lysecky - ACM Transactions on Embedded Computing Systems …, 2017 - dl.acm.org
Network-connected embedded systems grow on a large scale as a critical part of Internet of
Things, and these systems are under the risk of increasing malware. Anomaly-based …

Detecting execution anomalies as an oracle for autonomy software robustness

DS Katz, C Hutchison, M Zizyte… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
We propose a method for detecting execution anomalies in robotics and autonomy software.
The algorithm uses system monitoring techniques to obtain profiles of executions. It uses a …

Subcomponent timing-based detection of malware in embedded systems

S Lu, R Lysecky, J Rozenblit - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Network-connected embedded systems require multiple lines of defense against malware.
In addition to preventing malware by designing secure interfaces and software, anomaly …

[PDF][PDF] Identification of software failures in complex systems using low-level execution data

DSS Katz - 2020 - csd.cmu.edu
Autonomous and robotics systems (ARSs)–systems that are designed to react
independently and without human supervision to environmental stimuli–are complex and …

Using Dynamic Binary Instrumentation to Detect Failures in Robotics Software

DS Katz, CS Timperley, CL Goues - arXiv preprint arXiv:2201.12464, 2022 - arxiv.org
Autonomous and Robotics Systems (ARSs) are widespread, complex, and increasingly
coming into contact with the public. Many of these systems are safety-critical, and it is vital to …

Program anomaly detection against data-oriented attacks

L Cheng - 2018 - vtechworks.lib.vt.edu
Memory-corruption vulnerability is one of the most common attack vectors used to
compromise computer systems. Such vulnerabilities could lead to serious security problems …

[引用][C] Software Failures in Complex Systems Using Low-Level Execution Data

DSS Katz - Carnegie Mellon University …