-
Chapter and Conference Paper
Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure
Over the past few years, return-oriented programming (ROP) attacks have emerged as a prominent strategy for hijacking control of software. The full power and flexibility of ROP attacks was recently demonstrate...
-
Chapter and Conference Paper
Product Line Based Reuse Methodology for Develo** Generic ECU
As an important application domain of embedded software, auto-motive software is playing a more important role within automotive industry. There are some essential issues to be resolved; managing software comp...
-
Chapter and Conference Paper
Secure Password Pocket for Distributed Web Services
Password authentication (PA) is a general and well-known technique to authenticate a user who is trying to establish a connection in distributed web services. The main idea of PA is to remove complex informati...
-
Chapter and Conference Paper
Authenticated Public Key Distribution Scheme Without Trusted Third Party
Public key authentication is necessary to prevent a valid public key of a user from being compromised by a malicious user. Namely, if it is not provided, an adversary can read all encrypted messages between a ...