Y Deng, C Wang, S Yu, S Liu, Z Ning, K Leach… - Proceedings of the …, 2022 - dl.acm.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate computation such as image processing and numerical processing applications. However, in …
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted data centers; hence, the confidentiality and integrity of the code and data are of paramount …
Vulnerable third-party libraries pose significant threats to software applications that reuse these libraries. At an industry scale of reuse, manual analysis of third-party library …
H Lefeuvre, VA Bădoiu, Ş Teodorescu… - Proceedings of the …, 2021 - dl.acm.org
OS design is traditionally heavily intertwined with protection mechanisms. OSes statically commit to one or a combination of (1) hardware isolation,(2) runtime checking, and (3) …
L Luo, X Shao, Z Ling, H Yan, Y Wei… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The address space layout randomization (ASLR) has been widely deployed on modern operating systems against code reuse attacks (CRAs), such as return-oriented programming …
Software is becoming increasingly complex and feature-rich, yet only part of any given codebase is frequently used. Existing software customization and debloating approaches …
C Wang, Y Deng, Z Ning, K Leach, J Li… - … on Dependable and …, 2023 - ieeexplore.ieee.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate computation. However, Arm GPU security has not been explored by the community. Existing …
A Jacobs, M Gülmez, A Andries… - 2024 54th Annual …, 2024 - ieeexplore.ieee.org
Syscall interposition is crucial for tools that monitor/modify application behavior. Mainstream OSes have, therefore, provided syscall interposition APIs for years, but these often incur …
This paper presents DAEDALUS, a software diversity-based framework designed to resist ROP attacks on Linux-based IoT devices. DAEDALUS generates unique, semantically …