µShield: Configurable code-reuse attacks mitigation for embedded systems

4Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Embedded devices are playing a major role in our way of life. Similar to other computer systems embedded devices are vulnerable to code-reuse attacks. Compromising these devices in a critical environment constitute a significant security and safety risk. In this paper, we present µShield, a memory corruption exploitation mitigation system for embedded COTS binaries with configurable protection policies that do not rely on any hardware-specific feature. Our evaluation shows that µShield provides its protection with a limited performance overhead.

Author supplied keywords

Cite

CITATION STYLE

APA

Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E., & Etalle, S. (2017). µShield: Configurable code-reuse attacks mitigation for embedded systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10394 LNCS, pp. 694–709). Springer Verlag. https://doi.org/10.1007/978-3-319-64701-2_55

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free