Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–5 of 5 results for author: van der Kouwe, E

.
  1. arXiv:2405.00298  [pdf, other

    cs.CR

    The Reversing Machine: Reconstructing Memory Assumptions

    Authors: Mohammad Sina Karvandi, Soroush Meghdadizanjani, Sima Arasteh, Saleh Khalaj Monfared, Mohammad K. Fallah, Saeid Gorgin, Jeong-A Lee, Erik van der Kouwe

    Abstract: Existing anti-malware software and reverse engineering toolkits struggle with stealthy sub-OS rootkits due to limitations of run-time kernel-level monitoring. A malicious kernel-level driver can bypass OS-level anti-virus mechanisms easily. Although static analysis of such malware is possible, obfuscation and packing techniques complicate offline analysis. Moreover, current dynamic analyzers suffe… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

  2. arXiv:2007.03302  [pdf, ps, other

    cs.CR

    VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

    Authors: Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos

    Abstract: Polymorphism and inheritance make C++ suitable for writing complex software, but significantly increase the attack surface because the implementation relies on virtual function tables (vtables). These vtables contain function pointers that attackers can potentially hijack and in practice, vtable hijacking is one of the most important attack vector for C++ binaries. In this paper, we present VTab… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: Published in Annual Computer Security Applications Conference (ACSAC'19)

  3. arXiv:1903.08781  [pdf, other

    cs.AR cs.DC cs.RO eess.SY

    Fault-Tolerant Nanosatellite Computing on a Budget

    Authors: Christian M. Fuchs, Nadia Murillo, Aske Plaat, Erik Van der Kouwe, Daniel Harsono, Todor Stefanov

    Abstract: Micro- and nanosatellites have become popular platforms for a variety of commercial and scientific applications, but today are considered suitable mainly for short and low-priority space missions due to their low reliability. In part, this can be attributed to their reliance upon cheap, low-feature size, COTS components originally designed for embedded and mobile-market applications, for which tra… ▽ More

    Submitted 20 March, 2019; originally announced March 2019.

    Journal ref: Conference on Radiation Effects on Components and Systems 2018 (RADECS)

  4. arXiv:1902.09493  [pdf, other

    cs.DC cs.OS eess.SY

    Dynamic Fault Tolerance Through Resource Pooling

    Authors: Christian M. Fuchs, Nadia M. Murillo, Aske Plaat, Erik van der Kouwe, Todor Stefanov

    Abstract: Miniaturized satellites are currently not considered suitable for critical, high-priority, and complex multi-phased missions, due to their low reliability. As hardware-side fault tolerance (FT) solutions designed for larger spacecraft can not be adopted aboard very small satellites due to budget, energy, and size constraints, we developed a hybrid FT-approach based upon only COTS components, commo… ▽ More

    Submitted 21 February, 2019; originally announced February 2019.

    Journal ref: 2018 NASA/ESA Conference on Adaptive Hardware and Systems (AHS)

  5. arXiv:1801.02381  [pdf, other

    cs.CR

    Benchmarking Crimes: An Emerging Threat in Systems Security

    Authors: Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Gernot Heiser

    Abstract: Properly benchmarking a system is a difficult and intricate task. Unfortunately, even a seemingly innocuous benchmarking mistake can compromise the guarantees provided by a given systems security defense and also put its reproducibility and comparability at risk. This threat is particularly insidious as it is generally not a result of malice and can easily go undetected by both authors and reviewe… ▽ More

    Submitted 8 January, 2018; originally announced January 2018.