Skip to main content

Research Repository

Advanced Search

All Outputs (3)

Control-Flow Integrity: Attacks and Protections (2019)
Journal Article
Sayeed, S., Marco-Gisbert, H., Ripoll, I., & Birch, M. (2019). Control-Flow Integrity: Attacks and Protections. Applied Sciences, 9(20), Article 4229. https://doi.org/10.3390/app9204229

Despite the intense efforts to prevent programmers from writing code with memory errors, memory corruption vulnerabilities are still a major security threat. Consequently, control-flow integrity has received significant attention in the research comm... Read More about Control-Flow Integrity: Attacks and Protections.

DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network (2019)
Journal Article
Alsayed Kassem, J., Sayeed, S., Marco-Gisbert, H., Pervez, Z., & Dahal, K. (2019). DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network. Applied Sciences, 9(15), Article 2953. https://doi.org/10.3390/app9152953

Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The pro... Read More about DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network.

On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques (2019)
Presentation / Conference Contribution
Sayeed, S., & Marco-Gisbert, H. (2019, June). On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques. Presented at 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal

Memory error vulnerabilities are still widely exploited by attackers despite the various protections developed. Attackers have adopted new strategies to successfully exploit well-known memory errors bypassing mature protection techniques such us the... Read More about On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques.