Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach.
Zhijiao ZhangYa-Shuai LüYu ChenYongqiang LuYuanchun ShiPublished in: SEC (2015)
Keyphrases
- protection schemes
- code reuse
- source code
- low cost
- parallel architectures
- multi core processors
- real time
- software engineering
- digital signal processors
- access control
- hardware and software
- countermeasures
- security threats
- real time embedded
- memory management
- heterogeneous computing
- software evolution
- watermarking algorithm
- watermarking scheme
- risk management
- hardware implementation
- case study
- computer systems
- security protocols
- embedded systems
- watermarking technique
- parallel processing
- operating system
- field programmable gate array
- software development
- security risks
- functional units
- digital images
- multi agent systems
- computing systems
- artificial intelligence
- databases