A comprehensive survey of hardware-assisted security: From the edge to the cloud

L Coppolino, S D'Antonio, G Mazzeo, L Romano - Internet of Things, 2019 - Elsevier
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

Leveraging side-channel information for disassembly and security

J Park, F Rahman, A Vassilev, D Forte… - ACM Journal on …, 2019 - dl.acm.org
With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical
devices, smart home appliances, as well as traditional computing platforms such as …

SnakeGX: a sneaky attack against SGX Enclaves

F Toffalini, M Graziano, M Conti, J Zhou - International Conference on …, 2021 - Springer
Abstract Intel Software Guard eXtension (SGX) is a technology to create enclaves (ie, trusted
memory regions) hardware isolated from a compromised operating system. Recently …

Source code transformations for improving security of time-bounded K-variant systems

B Bekiroglu, B Korel - Information and Software Technology, 2021 - Elsevier
Context Source code transformation techniques can improve the security of systems against
memory exploitation attacks. As such, the chance of exploitation of security vulnerabilities …

[PDF][PDF] 面向动态生成代码的攻防技术综述

吴炜, 霍玮, 邹维 - 信息安全学报, 2016 - jcs.iie.ac.cn
摘要动态代码生成技术广泛使用在浏览器, Flash 播放器等重要日常软件中,
近年来其中曝出严重的安全问题, 为控制流劫持攻击和相应的防御提供了新机会 …

[PDF][PDF] Identifying & addressing challenges in embedded binary security

S Etalle, A Abbasi - 2017 - informatieprofessional.nl
Embedded systems are found everywhere from consumer electronics to critical
infrastructure. And with the growth of the Internet of Things (IoT), these systems are …

The never ending war in the stack and the reincarnation of ROP attacks

A Nader, J Calvet, JM Fernandez - arXiv preprint arXiv:2005.11886, 2020 - arxiv.org
Return Oriented Programming (ROP) is a technique by which an attacker can induce
arbitrary behavior inside a vulnerable program without injecting a malicious code. The …

Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log

A Liu, S Haidar, Y Cheng, Y Li - EAI Endorsed Transactions on Security …, 2019 - eudl.eu
Cloud computing provides versatile solutions that allow users to delegate their jobs. An
apparent limitation of most cloud audit services is that it is difficult for cloud users to tell the …

[PDF][PDF] Identifying & addressing challenges in embedded binary security

A Wetzels - 2017 - core.ac.uk
Embedded systems are found everywhere from consumer electronics to critical
infrastructure. And with the growth of the Internet of Things (IoT), these systems are …

[PDF][PDF] Strengthening Software Diversity Through Targeted Diversification

VS Sehrawat, Y Desmedt - 2016 - personales.upv.es
Code reuse attacks use snippets of code (called gadgets) from the target program. Software
diversity aims to thwart code reuse attacks by increasing the uncertainty regarding the target …