<--- Back to Details
First PageDocument Content
Computer architecture / Computing / System software / Software bugs / Embedded operating systems / Electrical engineering / Stack buffer overflow / FreeRTOS / Protection ring / Buffer overflow protection / Internet of things / Memory protection
Date: 2017-05-12 19:44:12
Computer architecture
Computing
System software
Software bugs
Embedded operating systems
Electrical engineering
Stack buffer overflow
FreeRTOS
Protection ring
Buffer overflow protection
Internet of things
Memory protection

Poster: EPOXY—Enabling Robust Protection for Bare-metal Systems Abraham A. Clements∗ , Naif Saleh Almakhdhub† , Khaled S. Saab‡ , Prashast Srivastava† , Jinkyu Koo† , Saurabh Bagchi† , Mathias Payer† ∗

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 94,49 KB

Share Document on Facebook

Similar Documents

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

DocID: 1rlqR - View Document

b  The heap sucks The Stack is Back – Jon Oberheide

b The heap sucks The Stack is Back – Jon Oberheide

DocID: 1pRdF - View Document

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

DocID: 1pkFG - View Document

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

DocID: 1oK9c - View Document

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

DocID: 1odF8 - View Document