Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices.
Kai LehnigerAbdelaziz SaadPeter LangendörferPublished in: Ann. des Télécommunications (2023)
Keyphrases
- resource constrained
- oriented programming
- security mechanisms
- resource constraints
- wireless sensor networks
- sensor networks
- embedded systems
- rfid tags
- resource limitations
- key management
- visual sensor networks
- object oriented
- multipath
- leader follower
- source code
- mobile devices
- database systems
- energy consumption
- simulated annealing
- relational databases