An SDN-enabled proactive defense framework for DDoS mitigation in IoT networks

Y Zhou, G Cheng, S Yu - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming truly ubiquitous in every domain of human lives, and
a large number of objects can be connected and enabled to communicate with cloud servers …

Strongbox: A gpu tee on arm endpoints

Y Deng, C Wang, S Yu, S Liu, Z Ning, K Leach… - Proceedings of the …, 2022 - dl.acm.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation such as image processing and numerical processing applications. However, in …

Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey

S Kumar, D Moolchandani, SR Sarangi - Journal of Systems Architecture, 2022 - Elsevier
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted
data centers; hence, the confidentiality and integrity of the code and data are of paramount …

Aspect-level information discrepancies across heterogeneous vulnerability reports: Severity, types and detection methods

J Sun, Z Xing, X Xia, Q Lu, X Xu, L Zhu - ACM Transactions on Software …, 2023 - dl.acm.org
Vulnerable third-party libraries pose significant threats to software applications that reuse
these libraries. At an industry scale of reuse, manual analysis of third-party library …

Flexos: Making os isolation flexible

H Lefeuvre, VA Bădoiu, Ş Teodorescu… - Proceedings of the …, 2021 - dl.acm.org
OS design is traditionally heavily intertwined with protection mechanisms. OSes statically
commit to one or a combination of (1) hardware isolation,(2) runtime checking, and (3) …

faslr: Function-based aslr via trustzone-m and mpu for resource-constrained iot systems

L Luo, X Shao, Z Ling, H Yan, Y Wei… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The address space layout randomization (ASLR) has been widely deployed on modern
operating systems against code reuse attacks (CRAs), such as return-oriented programming …

Dynacut: A framework for dynamic and adaptive program customization

A Mahurkar, X Wang, H Zhang… - Proceedings of the 24th …, 2023 - dl.acm.org
Software is becoming increasingly complex and feature-rich, yet only part of any given
codebase is frequently used. Existing software customization and debloating approaches …

Building a lightweight trusted execution environment for arm gpus

C Wang, Y Deng, Z Ning, K Leach, J Li… - … on Dependable and …, 2023 - ieeexplore.ieee.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation. However, Arm GPU security has not been explored by the community. Existing …

System Call Interposition Without Compromise

A Jacobs, M Gülmez, A Andries… - 2024 54th Annual …, 2024 - ieeexplore.ieee.org
Syscall interposition is crucial for tools that monitor/modify application behavior. Mainstream
OSes have, therefore, provided syscall interposition APIs for years, but these often incur …

DAEDALUS: Defense Against Firmware ROP Exploits Using Stochastic Software Diversity

I Obaidat, M Sridhar, F Tavakoli - arXiv preprint arXiv:2401.16234, 2024 - arxiv.org
This paper presents DAEDALUS, a software diversity-based framework designed to resist
ROP attacks on Linux-based IoT devices. DAEDALUS generates unique, semantically …