Interrupt-oriented bugdoor programming: A minimalist approach to bugdooring embedded systems firmware

SJ Tan, S Bratus, T Goodspeed - … of the 30th Annual Computer Security …, 2014 - dl.acm.org
We demonstrate a simple set of interrupt-related vulnerability primitives that, despite being
apparently innocuous, give attackers full control of a microcontroller platform. We then …

{“Weird}{Machines”} in {ELF}: A Spotlight on the Underappreciated Metadata

R Shapiro, S Bratus, SW Smith - 7th USENIX Workshop on Offensive …, 2013 - usenix.org
Although software exploitation historically started as an exercise in coaxing the target's
execution into attacker supplied binary shellcode, it soon became a practical study in …

Towards Understanding and Reducing Exploitability of Linux Kernel Bugs

Z Lin - 2023 - search.proquest.com
Abstract The Operating System (OS) kernel is a key component of modern computing
infrastructure, yet it is prone to numerous vulnerabilities, many of which cause memory …

[PDF][PDF] Identifying & addressing challenges in embedded binary security

S Etalle, A Abbasi - 2017 - informatieprofessional.nl
Embedded systems are found everywhere from consumer electronics to critical
infrastructure. And with the growth of the Internet of Things (IoT), these systems are …

[PDF][PDF] Kernel Self-Protection through Quantified Attack Surface Reduction.

A Kurmus - 2014 - leopard.tu-braunschweig.de
An operating system kernel orchestrates the use of the hardware by programs. Much of the
overall security of a system depends on the kernel, yet commodity OS kernels count millions …

[PDF][PDF] Identifying & addressing challenges in embedded binary security

A Wetzels - 2017 - core.ac.uk
Embedded systems are found everywhere from consumer electronics to critical
infrastructure. And with the growth of the Internet of Things (IoT), these systems are …

Avoiding a war on unauthorized computation

S Bratus, A Shubina - IEEE Security & Privacy, 2013 - ieeexplore.ieee.org
Any attempt to regulate-or, indeed, legally define-exploits will cause irreparable harm to both
coder freedoms and consumer systems' trustworthiness. It will reduce the sum of our …

Networks of hosts implementing DNS are NP-complete

M Kolybabi - 2019 - mspace.lib.umanitoba.ca
The Internet core protocols are the networking protocols that the Internet is built on, a subset
of which are implemented on every device connected to the Internet. The specifications of …

[PDF][PDF] Building Babel-Towards a Security System through Co-dependency and Diversity.

DMN de Castro - 2015 - prism.ucalgary.ca
A common misconception in computer security is that a computer is able to evaluate whether
or not it is compromised. However, if we consider a compromised system, the evaluation is …

[PDF][PDF] Avoiding a War on Unauthorized Computation: Why Exploit Regulation is the Biggest Danger to Coder Freedom and Future Security

S Bratus, A Shubina - cs.dartmouth.edu
In recent cyber-security discussions, several parties compared exploits with weapons (eg,
referred to development and sale of exploits as “arms dealing”) and called for legal …