Trustworthy prevention of code injection in linux on embedded devices

H Chfouka, H Nemati, R Guanciale, M Dam… - … --ESORICS 2015: 20th …, 2015 - Springer
… OpenBSD 3.3 has been one of the first OS enforcing executable space protection (\(W \… of
the modern kernels, trustworthy executable space protection can not be achieved without the …

Support for Secure Code Execution in Server Operating Systems

V Bhuse, K Hekhuis - … Conference on Cyber Warfare and Security, 2018 - books.google.com
… For memory protection, we looked at executable space protection, defeating randomness
prediction, and stack protection. We also looked at the policies for code auditing by each OS’s …

[PDF][PDF] Classification and prevention techniques of buffer overflow attacks

S Yadav, K Ahmad, J Shekhar - Proceedings of the 5th National …, 2011 - researchgate.net
Executable space protection is an approach to buffer overflow … a program, but with executable
space protection, any attempt to … also support the executable space protection technique, …

[PDF][PDF] Buffer overflow: Mechanism and countermeasures

V Chatole, G Nagar - … Journal of Advanced Research. IDeas And …, 2018 - academia.edu
… 3.2 Executable Space Protection: The idea behind Executable Space Protection (ESP) is that
if … Executable Space Protection is now shipped built-in with CPUs and Operating Systems. …

Fine-grained user-space security through virtualization

M Payer, TR Gross - ACM SIGPLAN Notices, 2011 - dl.acm.org
… Our sandbox offers the executable space protection mechanism which write protects
application and library code and implements full protection of the internal data structures using …

[PDF][PDF] secuBT: Hacking the hackers with user-space virtualization

M Payer - Proceedings of the 26c3, 2009 - nebelwelt.net
… 3.1 Executable Space Protection … secuBT: This configuration shows the overhead of
secuBT with executable space protection and system call interposition. …

Support for Secure Code Execution in Unix-Like Operating Systems

V Bhuse, J Nandigam - ICMLG 2017 5th International …, 2017 - books.google.com
… 3.1 Executable space protection According to the online document titled “Executable
Space Protection (X-Space)”, Executable Space Protection is a runtime hardening technique …

[PDF][PDF] PLDI: G: Smaller and More Secure: Static Debloating of MIPS Firmware Shared Libraries

H Zhang - src.acm.org
… (ROP) techniques enable attackers to chain together short instruction sequences (ie, code
gadgets) already present in the program’s memory to bypass the executable-space protection

ROP gadget prevalence and survival under compiler-based binary diversification schemes

J Coffman, DM Kelly, CC Wellons… - Proceedings of the 2016 …, 2016 - dl.acm.org
… A gadget is the building block of a ROP attack, a class of code reuse attacks designed to
circumvent executable space protection [33]. Executable space protection allows a memory …

[PDF][PDF] Internet of Pwnable Things

E Mitigations - usenix.org
Embedded systems are everywhere, from consumer electronics to critical infrastructure, and
with the rise of the Internet of Things (IoT), such systems are set to proliferate throughout all …