Share This Author
Library-Level Policy Enforcement
A system that allows policy to be implemented at the library call level, which screens calls to protected functions, while allowing the implementation of a high level form of control flow integrity based on library calls is described.
Efficient Monitoring of Library Call Invocation
- Marinos Tsantekidis, V. Prevelakis
- Computer ScienceSixth International Conference on Internet of…
- 1 October 2019
The technique is presented by analyzing the interception of a known exploit of the NGINX server and it is shown that the mechanism can detect and contain the attack and discuss the performance overheads.
Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System
An Intrusion Response System based on the Red-Zone principle is presented which meets the identified requirements and the integration of IRS through the vehicle system development and the different aspects which support such a process are discussed.
Software System Exploration Using Library Call Analysis
MMU-based Access Control for Libraries
An updated version of the kernel-side technique, where security policies are implemented in order to identify suspicious behavior and take some action accordingly, is presented.
Security for Heterogeneous Systems
Securing Runtime Memory via MMU Manipulation
This paper presents an extension to a previously developed mechanism for controlling access to libraries, in order to implement a scheme that allows each library to have its own private storage space.