-
1
-
-
85180405255
-
-
“CVE-2002-1633,” 2002, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1633.
-
(2002)
CVE-2002-1633
-
-
-
2
-
-
85180403923
-
-
“CVE-2002-2041,” 2002, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2041.
-
(2002)
CVE-2002-2041
-
-
-
3
-
-
85180405348
-
-
“CVE-2005-3928,” 2005, https://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-3928.
-
(2005)
CVE-2005-3928
-
-
-
4
-
-
85180403911
-
-
“CVE-2006-0621,” 2006, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0621.
-
(2006)
CVE-2006-0621
-
-
-
5
-
-
84903968496
-
-
“Ftrace: Function Tracer,” 2008, https://www.kernel.org/doc/Documentation/trace/ftrace.txt.
-
(2008)
Ftrace: Function Tracer
-
-
-
14
-
-
85180411652
-
-
“FreeRTOS-MPU,” 2016, http://www.freertos.org/FreeRTOS-MPUmemory-protection-unit.html.
-
(2016)
FreeRTOS-MPU
-
-
-
16
-
-
85180405887
-
-
“3DR IRIS+,” 2017, http://3dr.com/support/articles/207358106/iris/.
-
(2017)
3DR IRIS+
-
-
-
17
-
-
85180408168
-
-
“3DR Pixhawk,” 2017, http://3dr.com/support/articles/207358096/3dr_pixhawk/.
-
(2017)
3DR Pixhawk
-
-
-
18
-
-
85172555825
-
-
“ArduPilot,” 2017, http://ardupilot.org/.
-
(2017)
ArduPilot
-
-
-
20
-
-
85180404564
-
-
“Mbed OS,” 2017, https://www.mbed.com/en/development/mbed-os/.
-
(2017)
Mbed OS
-
-
-
21
-
-
85180410600
-
-
“Mbed uVisor,” 2017, https://www.mbed.com/en/technologies/security/uvisor/.
-
(2017)
Mbed uVisor
-
-
-
23
-
-
85180408260
-
-
“UAVCAN,” 2017, http://uavcan.org/.
-
(2017)
UAVCAN
-
-
-
24
-
-
84995527905
-
C-FLAT: Control-Flow Attestation for Embedded Systems Software
-
Vienna, Austria, Oct
-
T. Abera, N. Asokan, L. Davi, J.-E. Ekberg, T. Nyman, A. Paverd, A.-R. Sadeghi, and G. Tsudik, “C-FLAT: Control-Flow Attestation for Embedded Systems Software,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), Vienna, Austria, Oct. 2016.
-
(2016)
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS)
-
-
Abera, T.1
Asokan, N.2
Davi, L.3
Ekberg, J.-E.4
Nyman, T.5
Paverd, A.6
Sadeghi, A.-R.7
Tsudik, G.8
-
25
-
-
84910673981
-
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World
-
Scottsdale, AZ, Nov
-
A. M. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen, “Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS), Scottsdale, AZ, Nov. 2014.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS)
-
-
Azab, A. M.1
Ning, P.2
Shah, J.3
Chen, Q.4
Bhutkar, R.5
Ganesh, G.6
Ma, J.7
Shen, W.8
-
27
-
-
84987948162
-
Data Security and Privacy: Concepts, Approaches, and Research Directions
-
Atlanta, GA, Jun
-
E. Bertino, “Data Security and Privacy: Concepts, Approaches, and Research Directions,” in Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC), Atlanta, GA, Jun. 2016.
-
(2016)
Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC)
-
-
Bertino, E.1
-
28
-
-
84944111596
-
TyTAN: Tiny Trust Anchor for Tiny Devices
-
San Francisco, CA, Jun
-
F. Brasser, B. El Mahjoub, A.-R. Sadeghi, C. Wachsmann, and P. Koeberl, “TyTAN: Tiny Trust Anchor for Tiny Devices,” in Proceedings of the 52nd Annual Design Automation Conference (DAC), San Francisco, CA, Jun. 2015.
-
(2015)
Proceedings of the 52nd Annual Design Automation Conference (DAC)
-
-
Brasser, F.1
El Mahjoub, B.2
Sadeghi, A.-R.3
Wachsmann, C.4
Koeberl, P.5
-
29
-
-
85062418620
-
Non-Control-Data Attacks Are Realistic Threats
-
Baltimore, MD, Aug
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer, “Non-Control-Data Attacks Are Realistic Threats,” in Proceedings of the 14th USENIX Security Symposium (Security), Baltimore, MD, Aug. 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium (Security)
-
-
Chen, S.1
Xu, J.2
Sezer, E. C.3
Gauriar, P.4
Iyer, R. K.5
-
30
-
-
84987653130
-
Shreds: Fine-Grained Execution Units with Private Memory
-
San Jose, CA, May
-
Y. Chen, S. Reymondjohnson, Z. Sun, and L. Lu, “Shreds: Fine-Grained Execution Units with Private Memory,” in Proceedings of the 2016 IEEE Symposium on Security and Privacy (S&P), San Jose, CA, May 2016.
-
(2016)
Proceedings of the 2016 IEEE Symposium on Security and Privacy (S&P)
-
-
Chen, Y.1
Reymondjohnson, S.2
Sun, Z.3
Lu, L.4
-
31
-
-
85024501556
-
Protecting Bare-Metal Embedded Systems with Privilege Overlays
-
San Jose, CA, May
-
A. A. Clements, N. S. Almakhdhub, K. S. Saab, P. Srivastava, J. Koo, S. Bagchi, and M. Payer, “Protecting Bare-Metal Embedded Systems with Privilege Overlays,” in Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P), San Jose, CA, May 2017.
-
(2017)
Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P)
-
-
Clements, A. A.1
Almakhdhub, N. S.2
Saab, K. S.3
Srivastava, P.4
Koo, J.5
Bagchi, S.6
Payer, M.7
-
32
-
-
85084164090
-
Controlling UAVs with Sensor Input Spoofing Attacks
-
Austin, TX, Aug
-
D. Davidson, H. Wu, R. Jellinek, V. Singh, and T. Ristenpart, “Controlling UAVs with Sensor Input Spoofing Attacks,” in Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT), Austin, TX, Aug. 2016.
-
(2016)
Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT)
-
-
Davidson, D.1
Wu, H.2
Jellinek, R.3
Singh, V.4
Ristenpart, T.5
-
33
-
-
84860612202
-
ARDrone corruption
-
E. Deligne, “ARDrone corruption,” Journal in Computer Virology, vol. 8, no. 1, pp. 15–27, 2012.
-
(2012)
Journal in Computer Virology
, vol.8
, Issue.1
, pp. 15-27
-
-
Deligne, E.1
-
34
-
-
85073002683
-
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust
-
San Diego, CA, Feb
-
K. Eldefrawy, G. Tsudik, A. Francillon, and D. Perito, “SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust,” in Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Eldefrawy, K.1
Tsudik, G.2
Francillon, A.3
Perito, D.4
-
35
-
-
84903846058
-
A Minimalist Approach to Remote Attestation
-
Dresden, Germany, Mar
-
A. Francillon, Q. Nguyen, K. B. Rasmussen, and G. Tsudik, “A Minimalist Approach to Remote Attestation,” in Proceedings of the Conference on Design, Automation & Test in Europe (DATE), Dresden, Germany, Mar. 2014.
-
(2014)
Proceedings of the Conference on Design, Automation & Test in Europe (DATE)
-
-
Francillon, A.1
Nguyen, Q.2
Rasmussen, K. B.3
Tsudik, G.4
-
36
-
-
84912106901
-
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine
-
Atlanta, GA, Jun
-
Z. Gu, B. Saltaformaggio, X. Zhang, and D. Xu, “FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine,” in Proceedings of the 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta, GA, Jun. 2014.
-
(2014)
Proceedings of the 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
-
-
Gu, Z.1
Saltaformaggio, B.2
Zhang, X.3
Xu, D.4
-
37
-
-
84883401291
-
DRIP: A Framework for Purifying Trojaned Kernel Drivers
-
Budapest, Hungary, Jun
-
Z. Gu, W. N. Sumner, Z. Deng, X. Zhang, and D. Xu, “DRIP: A Framework for Purifying Trojaned Kernel Drivers,” in Proceedings of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, Jun. 2013.
-
(2013)
Proceedings of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
-
-
Gu, Z.1
Sumner, W. N.2
Deng, Z.3
Zhang, X.4
Xu, D.5
-
38
-
-
84954095782
-
Clean Application Compartmentalization with SOAAP
-
Denver, CO, Oct
-
K. Gudka, R. N. Watson, J. Anderson, D. Chisnall, B. Davis, B. Laurie, I. Marinos, P. G. Neumann, and A. Richardson, “Clean Application Compartmentalization with SOAAP,” in Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS), Denver, CO, Oct. 2015.
-
(2015)
Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS)
-
-
Gudka, K.1
Watson, R. N.2
Anderson, J.3
Chisnall, D.4
Davis, B.5
Laurie, B.6
Marinos, I.7
Neumann, P. G.8
Richardson, A.9
-
39
-
-
84994577088
-
An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture
-
Los Alamitos, CA, Jun
-
K. Highnam, K. Angstadt, K. Leach, W. Weimer, A. Paulos, and P. Hurley, “An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture,” in The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), Los Alamitos, CA, Jun. 2016.
-
(2016)
The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)
-
-
Highnam, K.1
Angstadt, K.2
Leach, K.3
Weimer, W.4
Paulos, A.5
Hurley, P.6
-
40
-
-
85011887464
-
Securing Commercial WiFi-Based UAVs From Common Security Attacks
-
Baltimore, MD, Nov
-
M. Hooper, Y. Tian, R. Zhou, B. Cao, A. P. Lauf, L. Watkins, W. H. Robinson, and W. Alexis, “Securing Commercial WiFi-Based UAVs From Common Security Attacks,” in Proceedings of 2016 IEEE Military Communications Conference (MILCOM), Baltimore, MD, Nov. 2016.
-
(2016)
Proceedings of 2016 IEEE Military Communications Conference (MILCOM)
-
-
Hooper, M.1
Tian, Y.2
Zhou, R.3
Cao, B.4
Lauf, A. P.5
Watkins, L.6
Robinson, W. H.7
Alexis, W.8
-
41
-
-
84995505153
-
Enforcing Least Privilege Memory Views for Multithreaded Applications
-
Vienna, Austria, Oct
-
T. C.-H. Hsu, K. Hoffman, P. Eugster, and M. Payer, “Enforcing Least Privilege Memory Views for Multithreaded Applications,” in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, Oct. 2016.
-
(2016)
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS)
-
-
Hsu, T. C.-H.1
Hoffman, K.2
Eugster, P.3
Payer, M.4
-
42
-
-
84900427392
-
TrustLite: A Security Architecture for Tiny Embedded Devices
-
Amsterdam, The Netherlands, Apr
-
P. Koeberl, S. Schulz, A.-R. Sadeghi, and V. Varadharajan, “TrustLite: A Security Architecture for Tiny Embedded Devices,” in Proceedings of the 9th European Conference on Computer Systems (EuroSys), Amsterdam, The Netherlands, Apr. 2014.
-
(2014)
Proceedings of the 9th European Conference on Computer Systems (EuroSys)
-
-
Koeberl, P.1
Schulz, S.2
Sadeghi, A.-R.3
Varadharajan, V.4
-
43
-
-
85056700228
-
Quantifiable Run-Time Kernel Attack Surface Reduction
-
Egham, UK, Jul
-
A. Kurmus, S. Dechand, and R. Kapitza, “Quantifiable Run-Time Kernel Attack Surface Reduction,” in Proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Egham, UK, Jul. 2014.
-
(2014)
Proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
-
-
Kurmus, A.1
Dechand, S.2
Kapitza, R.3
-
44
-
-
84906749325
-
Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring
-
San Diego, CA, Feb
-
A. Kurmus, R. Tartler, D. Dorneanu, B. Heinloth, V. Rothberg, A. Ruprecht, W. Schröder-Preikschat, D. Lohmann, and R. Kapitza, “Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring,” in Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2013.
-
(2013)
Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Kurmus, A.1
Tartler, R.2
Dorneanu, D.3
Heinloth, B.4
Rothberg, V.5
Ruprecht, A.6
Schröder-Preikschat, W.7
Lohmann, D.8
Kapitza, R.9
-
46
-
-
33745304805
-
Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation
-
Chicago, IL, Jun
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood, “Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation,” in Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Chicago, IL, Jun. 2005.
-
(2005)
Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V. J.8
Hazelwood, K.9
-
48
-
-
85076321179
-
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base
-
Washington, DC, Aug
-
J. Noorman, P. Agten, W. Daniels, R. Strackx, A. Van Herrewege, C. Huygens, B. Preneel, I. Verbauwhede, and F. Piessens, “Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base,” in Proceedings of the 22nd USENIX Security Symposium (Security), Washington, DC, Aug. 2013.
-
(2013)
Proceedings of the 22nd USENIX Security Symposium (Security)
-
-
Noorman, J.1
Agten, P.2
Daniels, W.3
Strackx, R.4
Van Herrewege, A.5
Huygens, C.6
Preneel, B.7
Verbauwhede, I.8
Piessens, F.9
-
49
-
-
84979224033
-
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices
-
San Sebastián, Spain, Jul
-
S. Pastrana, J. Tapiador, G. Suarez-Tangil, and P. Peris-Lopez, “AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices,” in Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), San Sebastián, Spain, Jul. 2016.
-
(2016)
Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
-
-
Pastrana, S.1
Tapiador, J.2
Suarez-Tangil, G.3
Peris-Lopez, P.4
-
50
-
-
84939503166
-
Automatic Feature Selection in Large-scale System-software Product Lines
-
Västerås, Sweden, Sep
-
A. Ruprecht, B. Heinloth, and D. Lohmann, “Automatic Feature Selection in Large-scale System-software Product Lines,” in Proceedings of the 2014 International Conference on Generative Programming: Concepts and Experiences (GPCE), Västerås, Sweden, Sep. 2014.
-
(2014)
Proceedings of the 2014 International Conference on Generative Programming: Concepts and Experiences (GPCE)
-
-
Ruprecht, A.1
Heinloth, B.2
Lohmann, D.3
-
51
-
-
85063376042
-
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
-
Washington, DC, Aug
-
Y. Son, H. Shin, D. Kim, Y. Park, J. Noh, K. Choi, J. Choi, and Y. Kim, “Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors,” in Proceedings of the 24th USENIX Security Symposium (Security), Washington, DC, Aug. 2015.
-
(2015)
Proceedings of the 24th USENIX Security Symposium (Security)
-
-
Son, Y.1
Shin, H.2
Kim, D.3
Park, Y.4
Noh, J.5
Choi, K.6
Choi, J.7
Kim, Y.8
-
52
-
-
84863437524
-
Efficient Isolation of Trusted Subsystems in Embedded Systems
-
Singapore, Sep
-
R. Strackx, F. Piessens, and B. Preneel, “Efficient Isolation of Trusted Subsystems in Embedded Systems,” in Proceedings of the 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), Singapore, Sep. 2010.
-
(2010)
Proceedings of the 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm)
-
-
Strackx, R.1
Piessens, F.2
Preneel, B.3
|