Securing Real-Time Microcontroller Systems through Customized Memory View Switching
暂无分享,去创建一个
Zhongshu Gu | Xiangyu Zhang | Dongyan Xu | Byoungyoung Lee | Hongjun Choi | Taegyu Kim | Chung Hwan Kim | X. Zhang | Dongyan Xu | Zhongshu Gu | Taegyu Kim | C. Kim | Byoungyoung Lee | Hongjun Choi
[1] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[2] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[3] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[4] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[5] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[6] Frank Piessens,et al. Efficient Isolation of Trusted Subsystems in Embedded Systems , 2010, SecureComm.
[7] Eddy Deligne. ARDrone corruption , 2011, Journal in Computer Virology.
[8] Karim M. El Defrawy,et al. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust , 2012, NDSS.
[9] Karim Eldefrawy. SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust , 2012, NDSS 2012.
[10] Zhongshu Gu,et al. DRIP: A framework for purifying trojaned kernel drivers , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[11] Wolfgang Schröder-Preikschat,et al. Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring , 2013, NDSS.
[12] Frank Piessens,et al. Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base , 2013, USENIX Security Symposium.
[13] Quan Chen,et al. Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World , 2014, CCS.
[14] Zhongshu Gu,et al. FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[15] Vijay Varadharajan,et al. TrustLite: a security architecture for tiny embedded devices , 2014, EuroSys '14.
[16] Rüdiger Kapitza,et al. Quantifiable Run-Time Kernel Attack Surface Reduction , 2014, DIMVA.
[17] Bernhard Heinloth,et al. Automatic feature selection in large-scale system-software product lines , 2014, GPCE 2014.
[18] Gene Tsudik,et al. A minimalist approach to Remote Attestation , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[19] Yongdae Kim,et al. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.
[20] Peter G. Neumann,et al. Clean Application Compartmentalization with SOAAP , 2015, CCS.
[21] Ahmad-Reza Sadeghi,et al. TyTAN: Tiny trust anchor for tiny devices , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[22] Ahmad-Reza Sadeghi,et al. C-FLAT: Control-Flow Attestation for Embedded Systems Software , 2016, CCS.
[23] Bin Cao,et al. Securing commercial WiFi-based UAVs from common security attacks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[24] Elisa Bertino,et al. Data Security and Privacy: Concepts, Approaches, and Research Directions , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[25] Hao Wu,et al. Controlling UAVs with Sensor Input Spoofing Attacks , 2016, WOOT.
[26] Westley Weimer,et al. An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).
[27] Pedro Peris-López,et al. AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices , 2016, DIMVA.
[28] Patrick Th. Eugster,et al. Enforcing Least Privilege Memory Views for Multithreaded Applications , 2016, CCS.
[29] Long Lu,et al. Shreds: Fine-Grained Execution Units with Private Memory , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[30] Jingling Xue,et al. SVF: interprocedural static value-flow analysis in LLVM , 2016, CC.
[31] Saurabh Bagchi,et al. Protecting Bare-Metal Embedded Systems with Privilege Overlays , 2017, 2017 IEEE Symposium on Security and Privacy (SP).