Gadgets of gadgets in industrial control systems: Return oriented programming attacks on PLCs

A Ayub, N Zubair, H Yoo, W Jo… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
In industrial control systems (ICS), programmable logic controllers (PLCs) directly control
and monitor physical processes in real-time such as nuclear plants, and power grid stations …

MemSafe: ensuring the spatial and temporal memory safety of C at runtime

MS Simpson, RK Barua - Software: Practice and Experience, 2013 - Wiley Online Library
Memory access violations are a leading source of unreliability in C programs. As evidence of
this problem, a variety of methods exist that retrofit C with software checks to detect memory …

Bringing Segmented Stacks to Embedded Systems

Z Ma, L Zhong - Proceedings of the 24th International Workshop on …, 2023 - dl.acm.org
Microcontrollers are the heart of embedded systems. Due to cost and power constraints, they
do not have memory management units (MMUs) or even memory protection units (MPUs) …

Call stack protection

JE Attinella, ME Giampapa, TM Gooding - US Patent 8,245,002, 2012 - Google Patents
Call stack protection, including executing at least one appli cation program on the one or
more computer processors, including initializing threads of execution, each thread hav ing a …

Enabling trusted scheduling in embedded systems

RJ Masti, C Marforio, A Ranganathan… - Proceedings of the 28th …, 2012 - dl.acm.org
The growing complexity and increased networking of security and safety-critical systems
expose them to the risk of adversarial compromise through remote attacks. These attacks …

Determining maximum stack usage in preemptive shared stack systems

K Hanninen, J Maki-Turja, M Bohlin… - 2006 27th IEEE …, 2006 - ieeexplore.ieee.org
This paper presents a novel method to determine the maximum stack memory used in
preemptive, shared stack, real-time systems. We provide a general and exact problem …

Bounding shared-stack usage in systems with offsets and precedences

M Bohlin, K Hänninen, J Mäki-Turja… - … Conference on Real …, 2008 - ieeexplore.ieee.org
The paper presents two novel methods to bound the stack memory used in preemptive,
shared stack, real-time systems. The first method is based on branch-and-bound search for …

Eliminating the call stack to save RAM

X Yang, N Cooprider, J Regehr - … of the 2009 ACM SIGPLAN/SIGBED …, 2009 - dl.acm.org
Most programming languages support a call stack in the programming model and also in the
runtime system. We show that for applications targeting low-power embedded …

Reducing stack with intra-task threshold priorities in real-time systems

G Yao, G Buttazzo - Proceedings of the tenth ACM international …, 2010 - dl.acm.org
In the design of hard real-time systems, the feasibility of the task set is one of the primary
concerns. However, in embedded systems with scarce resources, optimizing resource …

Software rejuvenation in embedded systems

CM Kintala - Journal of Automata, Languages and Combinatorics, 2009 - dl.acm.org
Mobile communication devices have multitasking embedded software running in their
operating systems (OS) as well as applications. Both the OS modules and the application …