Proofs or Remote Execution and Mitigation of TOCTOU Attacks
Abstract
References
Index Terms
- Proofs or Remote Execution and Mitigation of TOCTOU Attacks
Recommendations
On the TOCTOU Problem in Remote Attestation
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityMuch attention has been devoted to verifying software integrity of remote embedded (IoT) devices. Many techniques, with different assumptions and security guarantees, have been proposed under the common umbrella of so-called Remote Attestation (RA). ...
Challenges in Remote Attestation of Low-End Embedded Devices
TrustED '14: Proceedings of the 4th International Workshop on Trustworthy Embedded DevicesEmbedded computing devices increasingly permeate many aspects of modern life: from medical to automotive, from building and factory automation to weapons, from avionics to home entertainment. Despite their specialized nature as well as limited resources ...
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks
TrustED '14: Proceedings of the 4th International Workshop on Trustworthy Embedded DevicesCode reuse attacks such as return-oriented programming (ROP) are predominant attack techniques that are extensively used to exploit vulnerabilities in modern software programs. ROP maliciously combines short instruction sequences (gadgets) residing in ...
Comments
Information & Contributors
Information
Published In

- General Chairs:
- Hung-Min Sun,
- Shiuhpyng Shieh,
- Program Chairs:
- Guofei Gu,
- Giuseppe Ateniese
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Keynote
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 363Total Downloads
- Downloads (Last 12 months)79
- Downloads (Last 6 weeks)13
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in