咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 4 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 8 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 10 篇 instruction set ...
  • 2 篇 code injection
  • 2 篇 reverse engineer...
  • 2 篇 control flow int...
  • 2 篇 virtualized obfu...
  • 2 篇 address space ra...
  • 2 篇 instruction sets
  • 2 篇 cyber-physical s...
  • 2 篇 hardware
  • 1 篇 sql
  • 1 篇 code-reuse attac...
  • 1 篇 hardware assiste...
  • 1 篇 computer archite...
  • 1 篇 programmable har...
  • 1 篇 moving target de...
  • 1 篇 moving target de...
  • 1 篇 analysis knowled...
  • 1 篇 security of data
  • 1 篇 high assurance d...
  • 1 篇 data space rando...

机构

  • 2 篇 northwest univ s...
  • 1 篇 vanderbilt unive...
  • 1 篇 shaanxi normal u...
  • 1 篇 kth royal inst t...
  • 1 篇 dga mi bruz
  • 1 篇 katholieke univ ...
  • 1 篇 univ lancaster s...
  • 1 篇 imt atlantique b...
  • 1 篇 inria rba sed & ...
  • 1 篇 fdn res & techno...
  • 1 篇 univ texas san a...
  • 1 篇 texas tech univ ...
  • 1 篇 tech univ crete ...
  • 1 篇 univ texas dalla...
  • 1 篇 northwest univ s...
  • 1 篇 katholieke univ ...
  • 1 篇 univ houston dep...
  • 1 篇 vanderbilt univ ...
  • 1 篇 univ turku dept ...
  • 1 篇 fau erlangen nur...

作者

  • 2 篇 ye guixin
  • 2 篇 tang zhanyong
  • 2 篇 fang dingyi
  • 2 篇 gong xiaoqing
  • 2 篇 wang zheng
  • 1 篇 le bouder helene
  • 1 篇 de clercq ruan
  • 1 篇 guanciale robert...
  • 1 篇 goetzfried johan...
  • 1 篇 zhang zhenkai
  • 1 篇 vasiliadis giorg...
  • 1 篇 bradley david po...
  • 1 篇 xu shouhuai
  • 1 篇 xue chao
  • 1 篇 lin zhiqiang
  • 1 篇 potteiger bradle...
  • 1 篇 shi weidong
  • 1 篇 wang wei
  • 1 篇 li meng
  • 1 篇 wangg wei

语言

  • 10 篇 英文
检索条件"主题词=instruction set randomization"
10 条 记 录,以下是1-10 订阅
排序:
On Architectural Support for instruction set randomization
收藏 引用
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION 2020年 第4期17卷 1–26页
作者: Christou, George Vasiliadis, Giorgos Papaefstathiou, Vassilis Papadogiannakis, Antonis Ioannidis, Sotiris Fdn Res & Technol Hellas FORTH ICS Iraklion Greece Tech Univ Crete TUC ECE Khania Greece
instruction set randomization (ISR) is able to protect against remote code injection attacks by randomizing the instruction set of each process. Thereby, even if an attacker succeeds to inject code, it will fail to ex... 详细信息
来源: 评论
Protecting instruction set randomization from Code Reuse Attacks  23rd
Protecting Instruction Set Randomization from Code Reuse Att...
收藏 引用
23rd Nordic Conference on Secure IT Systems (NordSec)
作者: Guanciale, Roberto KTH Royal Inst Technol Dept Theoret Comp Sci Stockholm Sweden
instruction set randomization (ISR) prevents code injection by randomizing the instruction encoding used by programs, thus preventing an attacker from preparing a payload that can be injected in a victim. In this pape... 详细信息
来源: 评论
SOFIA: Software and control flow integrity architecture
收藏 引用
COMPUTERS & SECURITY 2017年 68卷 16-35页
作者: de Clercq, Ruan Goetzfried, Johannes Uebler, David Maene, Pieter Verbauwhede, Ingrid Katholieke Univ Leuven ESAT COSIC Leuven Belgium Katholieke Univ Leuven IMEC Leuven Belgium FAU Erlangen Nuremberg Dept Comp Sci Erlangen Germany
Software components are frequently used in cyber-physical systems (CPSes) to control a physical mechanism, such as a valve or brakes on a car. These systems are extremely sensitive to software vulnerabilities, as thei... 详细信息
来源: 评论
Diversifying SQL to prevent injection attacks  14
Diversifying SQL to prevent injection attacks
收藏 引用
Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE)
作者: Rauti, Sampsa Teuhola, Jukka Leppanen, Ville Univ Turku Dept Informat Technol Turku 20014 Finland
This paper proposes an idea of diversification to make SQL resistant against injection attacks. Our solution is based on a novel two-layered approach. It allows the SQL server to support several different instruction ... 详细信息
来源: 评论
Programmable Decoder and Shadow Threads: Tolerate Remote Code Injection Exploits with Diversified Redundancy  14
Programmable Decoder and Shadow Threads: Tolerate Remote Cod...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition (DATE)
作者: Liu, Ziyi Shi, Weidong Xu, Shouhuai Lin, Zhiqiang Univ Houston Dept Comp Sci Houston TX 77004 USA Univ Texas San Antonio Dept Comp Sci San Antonio TX 78249 USA Univ Texas Dallas Dept Comp Sci Dallas TX 75080 USA
We present a lightweight hardware framework for providing high assurance detection and prevention of code injection attacks using a lockstep diversified shadow execution. Recent studies show that hardware diversificat... 详细信息
来源: 评论
Exploiting Code Diversity to Enhance Code Virtualization Protection  24
Exploiting Code Diversity to Enhance Code Virtualization Pro...
收藏 引用
24th IEEE International Conference on Parallel and Distributed Systems (ICPADS)
作者: Xue, Chao Tang, Zhanyong Ye, Guixin Li, Guanghui Gong, Xiaoqing Wangg, Wei Fang, Dingyi Wang, Zheng Northwest Univ Sch Informat Sci & Technol Xian Shaanxi Peoples R China Univ Lancaster Sch Comp & Commun Metalab Lancaster England
Code virtualization built upon virtual machine (VM) technologies is emerging as a viable method for implementing code obfuscation to protect programs against unauthorized analysis. State-of-the-art VM-based protection... 详细信息
来源: 评论
Hardware-Assisted Program Execution Integrity: HAPEI  23rd
Hardware-Assisted Program Execution Integrity: HAPEI
收藏 引用
23rd Nordic Conference on Secure IT Systems (NordSec)
作者: Lashermes, Ronan Le Bouder, Helene Thomas, Gael INRIA RBA SED & LHS Rennes France IMT Atlantique Brest France DGA MI Bruz France
Even if a software is proven sound and secure, an attacker can still insert vulnerabilities with fault attacks. In this paper, we propose HAPEI, an instruction set randomization scheme to guarantee Program Execution I... 详细信息
来源: 评论
A Moving Target Defense Approach Towards Security And Resilience In Cyber-Physical Systems
A Moving Target Defense Approach Towards Security And Resili...
收藏 引用
作者: Bradley David Potteiger Vanderbilt University
学位级别:博士
Cyber-Physical Systems (CPS) such as autonomous vehicles are becoming widely utilized throughout society. CPS are unique with respect to the tightly coupled nature between the cyber software and physical dynamics of a... 详细信息
来源: 评论
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity
收藏 引用
IEEE ACCESS 2019年 7卷 169160-169173页
作者: Wang, Wei Li, Meng Tang, Zhanyong Wang, Huanting Ye, Guixin Wang, Fuwei Ren, Jie Gong, Xiaoqing Fang, Dingyi Wang, Zheng Northwest Univ Sch Informat Sci & Technol Xian 710127 Peoples R China Northwest Univ Shaanxi Int Joint Res Ctr Battery Free Internet T Xian 710127 Peoples R China Shaanxi Normal Univ Sch Comp Sci Xian 710062 Peoples R China Univ Leeds Sch Comp Leeds LS2 9JT W Yorkshire England
To protect programs from unauthorized analysis, virtualize the code based on Virtual Machine (VM) technologies is emerging as a feasible method for accomplishing code obfuscation. However, in some State-of-the-art VM-... 详细信息
来源: 评论
Integrated moving target defense and control reconfiguration for securing Cyber-Physical systems
收藏 引用
MICROPROCESSORS AND MICROSYSTEMS 2020年 73卷
作者: Potteiger, Bradley Zhang, Zhenkai Koutsoukos, Xenofon Vanderbilt Univ 221 Kirkland Hall Nashville TN 37235 USA Texas Tech Univ Lubbock TX 79409 USA
With the increasingly connected nature of Cyber-Physical Systems (CPS), new attack vectors are emerging that were previously not considered in the design process. Specifically, autonomous vehicles are one of the most ... 详细信息
来源: 评论