Using Fuzzing and Static Analysis to Discover Exploitable Bugs in Cyber-physical Systems
Cyber-physical systems (CPS) integrate computer-based algorithms with physical processes. They are found in critical infrastructure like power grids…
Cyber-physical systems (CPS) integrate computer-based algorithms with physical processes. They are found in critical infrastructure like power grids…
In recent years, the security of multimedia processing systems has become a significant concern for developers and security researchers. One area that has…
Container technology has revolutionized the way software is deployed and managed. However, as with any complex system, security vulnerabilities can arise…
Cloud infrastructure has become the backbone of modern IT environments, supporting everything from data storage to application deployment. However, this…
Distributed Ledger Technologies (DLTs), including blockchain systems, are praised for their security and transparency. However, like any complex system, they…
In the rapidly evolving field of cybersecurity, side-channel attacks have emerged as a significant threat to hardware encryption modules. These attacks exploit…
Buffer overflows are a common security vulnerability that can have severe consequences, especially in critical systems like medical devices. Understanding how…
In recent years, automotive cybersecurity has become a critical area of concern as vehicles increasingly rely on complex software systems. One particularly…
Return-Oriented Programming (ROP) is an advanced exploitation technique that allows attackers to execute arbitrary code within a target device’s firmware…
Industrial control systems (ICS) are critical components in managing infrastructure such as power plants, manufacturing facilities, and water treatment plants…