nanoll extt
Please use this identifier to cite or link to this item: http://lrcdrs.bennett.edu.in:80/handle/123456789/1891
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSingh, Simar Preet
dc.date.accessioned2023-07-27T06:02:10Z-
dc.date.available2023-07-27T06:02:10Z-
dc.date.issued2022
dc.identifier.issn2367-3370
dc.identifier.urihttps://doi.org/10.1007/978-981-19-1122-4_19
dc.identifier.urihttp://lrcdrs.bennett.edu.in:80/handle/123456789/1891-
dc.description.abstractAn application running on the Internet of Things (IoT) device is vulnerable to code reuse attacks, which makes control flow highjacking relatively easy. Control Flow Integrity (CFI) is widely known to make code tampering harder. Available CFI solutions mostly work for x86 (Intel architecture), but most of the IoT devices use the ARM architecture. This paper presents a novel control-flow obfuscation technique for IoT devices, especially for the ARM architecture. This paper uses Return Oriented Programming (ROP), used for code reuse attacks, to prevent control flow in IoT devices. The proposed method is a selfcontained code integrity verification approach that protects control flow by ROP gadgets and implicitly verifies integrity by “U-probe”. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.en_US
dc.publisherSpringer Science and Business Media Deutschland GmbHen_US
dc.subjectARM architectureen_US
dc.subjectCode tamperingen_US
dc.subjectControl flow integrityen_US
dc.subjectInternet of Things (IoT) securityen_US
dc.subjectReturn oriented programmingen_US
dc.titleCode Tamper-Proofing Using Return Oriented Programming in IoT Devicesen_US
dc.typeArticleen_US
dc.indexedscen_US
Appears in Collections:Conference/Seminar Papers_ SCSET

Files in This Item:
File SizeFormat 
1056.pdf
  Restricted Access
747.07 kBAdobe PDFView/Open Request a copy

Contact admin for Full-Text

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.