Web: http://arxiv.org/abs/2211.16212

Nov. 30, 2022, 2:10 a.m. | Olivier Gilles, Franck Viguier, Nikolai Kosmatov, Daniel Gracia Pérez

cs.CR updates on arXiv.org arxiv.org

RISC-V is an open instruction set architecture recently developed for
embedded real-time systems. To achieve a lasting security on these systems and
design efficient countermeasures, a better understanding of vulnerabilities to
novel and potential future attacks is mandatory. This paper demonstrates that
RISC-V is sensible to Jump-Oriented Programming, a class of complex code-reuse
attacks, able to bypass existing protections. We provide a first analysis of
RISC-V systems' attack surface exploitable by such attacks, and show how they
can be chained …

control flow integrity programming

Penetration Testers - Red Team ICS/OT and Network Experience

@ Waterleaf International LLC | Florida

Chief Information Security Officer

@ Los Angeles Unified School District | Los Angeles

Cybersecurity Engineer

@ Apercen Partners LLC | Folsom, CA

IDM Sr. Security Developer

@ The Ohio State University | Columbus, OH, United States

IT Security Engineer

@ Stylitics | New York City

Information Security Engineer

@ VDA Labs | Remote

Red Team Security Engineer

@ Keeper Security, Inc. | United States - Remote

2023 Security Operations Internship

@ Censys | Ann Arbor, Michigan, United States

Cloud Support Engineer - Security, WFH/In-Office, Mandarin Speaker

@ Amazon.com | Taipei City, TWN

SC2023-002701 IT Analyst- Cloud-Based Ext. Attack Surface Mgmt. (NS)- TUE 21 FEB

@ EMW, Inc. | Mons, Wallonia, Belgium

Cyber Security Consultant

@ Eurofins | Haarlem, Netherlands

Crisis & Cyber Security Management Senior Analyst

@ NielsenIQ | Madrid, Spain