Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security 2017
DOI: 10.1145/3052973.3053014
|View full text |Cite
|
Sign up to set email alerts
|

Memory Safety for Embedded Devices with nesCheck

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…With the rapid increase in popularity of Internet-of-Things devices, one may be wary of the compromises made in terms of security in order to achieve increased compatibility and power efficiency. It is our hope 2 Common Vulnerabilities and Exposures: https://cve.mitre.org/cve that this analysis can be a first step in evaluating the control-flow integrity of such embedded operating systems.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…With the rapid increase in popularity of Internet-of-Things devices, one may be wary of the compromises made in terms of security in order to achieve increased compatibility and power efficiency. It is our hope 2 Common Vulnerabilities and Exposures: https://cve.mitre.org/cve that this analysis can be a first step in evaluating the control-flow integrity of such embedded operating systems.…”
Section: Discussionmentioning
confidence: 99%
“…2 However, there were challenges in obtaining old variants of such software for each operating system that we chose to investigate. For compatibility reasons and so that the comparisons being made are with the same software, we decided to develop our own vulnerable software.…”
Section: Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Research projects also tackle the memory protection problem on a programming-language level for embedded devices. nesCheck [14] modifies the language and compiler to perform stronger type safety, static analysis, and run-time checks. Others develop new compiler frameworks to address stack, array and pointer safety, and implement new heap allocation techniques [15].…”
Section: A State-of-the-artmentioning
confidence: 99%
“…Existing embedded system memory protections mediate access only to large segments of code and data. Protecting finer granularities often requires explicit checks from the compiler or programmer at a cost of run-time slowdown [15] [14], and can be error-prone or incomplete [2]. An architecture should provide a generic mechanism for low-cost and fine-grained memory protection.…”
Section: Requirementsmentioning
confidence: 99%