supported in part by the National Natural Science Foundation of China(No.61272452);the National Key Basic Research and Development(973)Program of China(No.2014CB340601);the Natural Science Foundation of Hubei Province(No.2017CFB663)
Code reuse attacks pose a severe threat to modern applications. These attacks reuse existing code segments of vulnerable applications as attack payloads and hijack the control flow of a victim application. With high c...
supported by the National HighTech Research and Development (863) Program (No. 2015AA016002);the National Key Basic Research Program of China (No. 2014CB340600);the National Natural Science Foundation of China (Nos. 61303024 and 61272452);the Natural Science Foundation of Jiangsu Province (Nos. BK20130372)
In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leaka...
supported by the State Key Program of National Natural Science Foundation of China(Grant No.91118003);the National Natural Science Foundation of China(Grant No.61173138,61272452,61332019);the National Basic Research Program of China("973"Program)(Grant No.2014CB340600);the National High-Tech Research and Development Program of China("863"Program)(Grant No.2015AA016002)
This paper analyzes the threat of TCG Software Stack(TSS)/TCM Service Module(TSM) deadlock in multi-user environment such as cloud and discusses its causes and mechanism.In addition,this paper puts forward a dynamic p...