SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
Sok: Runtime integrity
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …
[PDF][PDF] RAI: Securing Embedded Systems with Return Address Integrity
NS Almakhdhub, AA Clements, S Bagchi… - Network and Distributed …, 2020 - par.nsf.gov
Embedded systems are deployed in security critical environments and have become a
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …
Silhouette: Efficient protected shadow stacks for embedded systems
Microcontroller-based embedded systems are increasingly used for applications that can
have serious and immediate consequences if compromised—including automobile control …
have serious and immediate consequences if compromised—including automobile control …
Finding cracks in shields: On the security of control flow integrity mechanisms
Control-flow integrity (CFI) is a promising technique to mitigate control-flow hijacking attacks.
In the past decade, dozens of CFI mechanisms have been proposed by researchers …
In the past decade, dozens of CFI mechanisms have been proposed by researchers …
Sherloc: Secure and holistic control-flow violation detection on embedded systems
Microcontroller-based embedded systems are often programmed in low-level languages
and are vulnerable to control-flow hijacking attacks. One approach to prevent such attacks is …
and are vulnerable to control-flow hijacking attacks. One approach to prevent such attacks is …
Holistic {Control-Flow} protection on {Real-Time} embedded systems with kage
This paper presents Kage: a system that protects the control data of both application and
kernel code on microcontroller-based embedded systems. Kage consists of a Kage …
kernel code on microcontroller-based embedded systems. Kage consists of a Kage …
Securing Internet of Things devices against code tampering attacks using Return Oriented Programming
Code tampering is serious issue in Internet of Things (IOT). IoT devices are used to collect
environment data like temperature value, light intensity, hart pulse etc. Once an IoT device …
environment data like temperature value, light intensity, hart pulse etc. Once an IoT device …
FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …