Cyber Center

Cyber Center Develops Defense Techniques for IoT A team of Cyber Center Researchers

September 10, 2015

The technique, called DisARM, protects against both code-injection and code-reuse based buffer overflow attacks by breaking the ability for attackers to manipulate the return addresses of functions. DisARM is able to operate on arbitrary executable binaries and thus does not require compiler support.

In addition it does not require user interactions and can thus be automatically applied. Experimental results show that DisARM incurs low overhead.

A paper presenting the design and experimental evaluation of DisARM will be presented at the NSS 2015 to be held in New York City  on November 3-5, 2015.

Bookmark and Share