Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization
- K. Snow, F. Monrose, Lucas Davi, A. Dmitrienko, Christopher Liebchen, A. Sadeghi
- Computer ScienceIEEE Symposium on Security and Privacy
- 1 May 2013
This paper introduces the design and implementation of a framework based on a novel attack strategy that undermines the benefits of fine-grained ASLR by exploiting the ability to repeatedly abuse a memory disclosure to map an application's memory layout on the fly.
Return-oriented programming without returns
- Stephen Checkoway, Lucas Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, M. Winandy
- Computer ScienceConference on Computer and Communications…
- 4 October 2010
We show that on both the x86 and ARM architectures it is possible to mount return-oriented programming attacks without using return instructions. Our attacks instead make use of certain instruction…
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
- Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, A. Sadeghi, Thorsten Holz
- Computer ScienceIEEE Symposium on Security and Privacy
- 17 May 2015
It is demonstrated that many of these defenses that do not consider object-oriented C++ semantics precisely can be generically bypassed in practice, and that even recently proposed defenses that specifically target C++ are vulnerable to COOP.
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
- Markus Miettinen, Samuel Marchal, I. Hafeez, N. Asokan, A. Sadeghi, S. Tarkoma
- Computer ScienceIEEE International Conference on Distributed…
- 15 November 2016
IoT Sentinel is presented, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise.
TrustLite: a security architecture for tiny embedded devices
- Patrick Koeberl, Steffen Schulz, A. Sadeghi, V. Varadharajan
- Computer ScienceEuropean Conference on Computer Systems
- 14 April 2014
This work describes mechanisms for secure exception handling and communication between protected modules, enabling seamless interoperability with untrusted operating systems and tasks, and presents the TrustLite security architecture for flexible, hardware-enforced isolation of software modules.
Readactor: Practical Code Randomization Resilient to Memory Disclosure
- Stephen Crane, Christopher Liebchen, M. Franz
- Computer ScienceIEEE Symposium on Security and Privacy
- 17 May 2015
This paper presents the first practical, fine-grained code randomization defense, called Read actor, resilient to both static and dynamic ROP attacks, and uses a new compiler-based code generation paradigm that uses hardware features provided by modern CPUs to enable execute-only memory and hide code pointers from leakage to the adversary.
C-FLAT: Control-Flow Attestation for Embedded Systems Software
- Tigist Abera, N. Asokan, G. Tsudik
- Computer ScienceConference on Computer and Communications…
- 25 May 2016
The design and implementation of Control-FLow ATtestation (C-FLAT) is presented that enables remote attestation of an application's control-flow path, without requiring the source code, and its performance is evaluated using a real-world embedded application and against control- flow hijacking attacks.
Security and privacy challenges in industrial Internet of Things
- A. Sadeghi, C. Wachsmann, M. Waidner
- Computer ScienceDesign Automation Conference
- 7 June 2015
This paper gives an introduction to industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems.
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
- V. Kolesnikov, A. Sadeghi, T. Schneider
- Computer Science, MathematicsIACR Cryptology ePrint Archive
- 23 November 2009
We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (SFE) in the semi-honest model.
We describe efficient GC constructions for addition, subtraction,…
Unsafe exposure analysis of mobile in-app advertisements
- Michael C. Grace, Wu Zhou, Xuxian Jiang, A. Sadeghi
- Computer ScienceWireless Network Security
- 16 April 2012
The investigation indicates the symbiotic relationship between embedded ad libraries and host apps is one main reason behind these exposed risks, and clearly shows the need for better regulating the way ad libraries are integrated in Android apps.
...
...