SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

Sok: Runtime integrity

M Ammar, A Caulfield, IDO Nunes - arXiv preprint arXiv:2408.10200, 2024 - arxiv.org
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …

Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone

J Wang, A Li, H Li, C Lu, N Zhang - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …

[PDF][PDF] RAI: Securing Embedded Systems with Return Address Integrity

NS Almakhdhub, AA Clements, S Bagchi… - Network and Distributed …, 2020 - par.nsf.gov
Embedded systems are deployed in security critical environments and have become a
prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly …

Silhouette: Efficient protected shadow stacks for embedded systems

J Zhou, Y Du, Z Shen, L Ma, J Criswell… - 29th USENIX Security …, 2020 - usenix.org
Microcontroller-based embedded systems are increasingly used for applications that can
have serious and immediate consequences if compromised—including automobile control …

Finding cracks in shields: On the security of control flow integrity mechanisms

Y Li, M Wang, C Zhang, X Chen, S Yang… - Proceedings of the 2020 …, 2020 - dl.acm.org
Control-flow integrity (CFI) is a promising technique to mitigate control-flow hijacking attacks.
In the past decade, dozens of CFI mechanisms have been proposed by researchers …

Sherloc: Secure and holistic control-flow violation detection on embedded systems

X Tan, Z Zhao - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Microcontroller-based embedded systems are often programmed in low-level languages
and are vulnerable to control-flow hijacking attacks. One approach to prevent such attacks is …

Holistic {Control-Flow} protection on {Real-Time} embedded systems with kage

Y Du, Z Shen, K Dharsee, J Zhou, RJ Walls… - 31st USENIX Security …, 2022 - usenix.org
This paper presents Kage: a system that protects the control data of both application and
kernel code on microcontroller-based embedded systems. Kage consists of a Kage …

Securing Internet of Things devices against code tampering attacks using Return Oriented Programming

RK Shrivastava, SP Singh, MK Hasan, S Islam… - Computer …, 2022 - Elsevier
Code tampering is serious issue in Internet of Things (IOT). IoT devices are used to collect
environment data like temperature value, light intensity, hart pulse etc. Once an IoT device …

FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking

AJ Gaidis, J Moreira, K Sun, A Milburn… - Proceedings of the 26th …, 2023 - dl.acm.org
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …