Session
"Look Both Ways Before You Cross"
Session Chair
DescriptionSecurity is critical in every facet of system design. One slight security misstep will leave your system vulnerable to attack. This session addresses cross-layer security weaknesses, vulnerabilities, and mitigations. Attendees will learn how to safely navigate security at the intersection of processor architectures, operating systems, and firmware, ensuring a safe and secure journey to the other side.
Event TypeResearch Manuscript
TimeWednesday, June 2610:30am - 12:00pm PDT
Location3012, 3rd Floor
Security
Embedded and Cross-Layer Security
Presentations
10:30am - 10:45am PDT | Trapped by Your WORDs: (Ab)using Processor Exception for Generic Binary Instrumentation on Bare-metal Embedded Devices | |
10:45am - 11:00am PDT | TATOO: A Flexible Hardware Platform for Binary-Only Fuzzing | |
11:00am - 11:15am PDT | SPECRUN: The Danger of Speculative Runahead Execution in Processors | |
11:15am - 11:30am PDT | Look Before You Access: Efficient Heap Memory Safety for Embedded Systems on ARMv8-M | |
11:30am - 11:45am PDT | Effectively Sanitizing Embedded Operating Systems | |
11:45am - 12:00pm PDT | Laser Shield: a Physical Defense with Polarizer against Laser Attack |