Acknowledgement
이 성과는 정부(과학기술정보통신부)의 재원으로 한국연구재단의 지원 (NRF-2022R1C1C11010494) 및 정보통신기획평가원의 지원 (RS-2022-II220688, RS-2022-II221199, RS-2024-00437306, RS-2024-00439819) 을 받아 수행된 연구임.
References
- Jie Zhou, et al. Silhouette: Efficient protected shadow stacks for embedded systems. In 29th USENIX Security Symposium (USENIX Security 20), pages 1219-1236.
- Yufei Du, et al. Holistic Control-Flow protection on Real-Time embedded systems with kage. In 31st USENIX Security Symposium (USENIX Security 22), pages 2281-2298.
- Xi Tan, et al. Sherloc: Secure and holistic control-flow violation detection on embedded systems. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS '23, page 1332-1346.
- Yujie Wang, et al. Insectacide: Debugger-based holistic asynchronous cfi for embedded system. In 2024 IEEE 30th Real-Time and Embedded Technology and Applications Symposium (RTAS), page 360-372.
- Zhichuang Sun, et al. Oat: Attesting operation integrity of embedded devices. In 2020 IEEE Symposium on Security and Privacy (SP), page 1433-1449.
- Chung Hwan Kim, et al. Securing Real-Time Microcontroller Systems through Customized Memory View Switching. In Proceedings of the 25th Network and Distributed System Security Symposium (NDSS 2018), San Diego, CA.
- Arslan Khan, et al. Low-cost privilege separation with compile time compartmentalization for embedded systems. In 2023 IEEE Symposium on Security and Privacy (SP), page 3008-3025.
- Arslan Khan, et al. Ec: Embedded systems compartmentalization via intra-kernel isolation. In 2023 IEEE Symposium on Security and Privacy (SP), page 2990-3007.