SuM: Efficient shadow stack protection on ARM Cortex-M

W Choi, M Seo, S Lee, BB Kang - Computers & Security, 2024 - Elsevier
Abstract System software written in unsafe languages such as C/C++ is susceptible to
various types of security vulnerabilities. Historically, backward-edges such as return …

HARM: Hardware-assisted continuous re-randomization for microcontrollers

J Shi, L Guan, W Li, D Zhang, P Chen… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
Microcontroller-based embedded systems have become ubiquitous with the emergence of
IoT technology. Given its critical roles in many applications, its security is becoming …

{SoK}:{Where's} the {“up”?}! A Comprehensive (bottom-up) Study on the Security of Arm {Cortex-M} Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - 18th USeNIX WOOT …, 2024 - usenix.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …

Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - arXiv preprint arXiv …, 2024 - arxiv.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …

Randezvous: Making Randomization Effective on MCUs

Z Shen, K Dharsee, J Criswell - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Internet-of-Things devices such as autonomous vehicular sensors, medical devices, and
industrial cyber-physical systems commonly rely on small, resource-constrained …

uBOX: A Lightweight and Hardware-assisted Sandbox for Multicore Embedded Systems

X Zhou, Y Bu, M Xu, Y Zhou… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Multicore embedded systems employ a big. LITTLE architecture to combine different cores
into a single microcontroller (MCU). However, resources sharing among cores raises …

InvisiGuard: Data Integrity for Microcontroller-Based Devices via Hardware-Triggered Write Monitoring

D Fang, A Peng, E van der Kouwe… - … on Dependable and …, 2024 - ieeexplore.ieee.org
This paper considers a strongly connected network of agents, each capable of partially
observing and controlling a discrete-time linear time-invariant (LTI) system that is jointly …

Cabin: Confining Untrusted Programs within Confidential VMs

B Mei, S Xia, W Wang, D Lin - International Conference on Information and …, 2024 - Springer
Confidential computing safeguards sensitive computations from untrusted clouds, with
Confidential Virtual Machines (CVMs) providing a secure environment for guest OS …

InversOS: Efficient Control-Flow Protection for AArch64 Applications with Privilege Inversion

Z Shen, J Criswell - arXiv preprint arXiv:2304.08717, 2023 - arxiv.org
With the increasing popularity of AArch64 processors in general-purpose computing,
securing software running on AArch64 systems against control-flow hijacking attacks has …

Hardware-Implemented Security Processing Unit for Program Execution Monitoring and Instruction Fault Self-Repairing on Embedded Systems

Z Zhang, X Wang, Q Hao, D Xu, J Wang, J Liu, J Ma… - Applied Sciences, 2022 - mdpi.com
Embedded systems are increasingly applied in numerous security-sensitive applications,
such as industrial controls, railway transports, intelligent vehicles, avionics and aerospace …