Login / Signup
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices.
AbdElaziz Saad AbdElaziz AbdElaal
Kai Lehniger
Peter Langendörfer
Published in:
CSNet (2021)
Keyphrases
</>
resource constrained
oriented programming
security mechanisms
resource constraints
embedded systems
wireless sensor networks
sensor networks
resource limitations
visual sensor networks
rfid tags
object oriented
lightweight
key management
source code
end to end
databases
shortest path
open source
multi agent