CEFI: Command Execution Flow Integrity for Embedded Devices. Peng, A., Fang, D., Zhou, W., Van der Kouwe, E., Li, Y., & Zhang, Y. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, June, 2023.
Paper bibtex 6 downloads @inproceedings{pengCEFICommandExecution2023,
title = {{CEFI}: {Command} {Execution} {Flow} {Integrity} for {Embedded} {Devices}},
url = {Paper=https://download.vusec.net/papers/cefi_dimva23.pdf},
booktitle = {International {Conference} on {Detection} of {Intrusions} and {Malware}, and {Vulnerability} {Assessment}},
author = {Peng, Anni and Fang, Dongliang and Zhou, Wei and Van der Kouwe, Erik and Li, Yin and Zhang, Yiqing},
month = jun,
year = {2023},
keywords = {proj\_vulcan, type\_conf, type\_paper, type\_top},
}
Downloads: 6
{"_id":"fBiC9bwc5WkEdbZLH","bibbaseid":"peng-fang-zhou-vanderkouwe-li-zhang-ceficommandexecutionflowintegrityforembeddeddevices-2023","author_short":["Peng, A.","Fang, D.","Zhou, W.","Van der Kouwe, E.","Li, Y.","Zhang, Y."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"CEFI: Command Execution Flow Integrity for Embedded Devices","booktitle":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","author":[{"propositions":[],"lastnames":["Peng"],"firstnames":["Anni"],"suffixes":[]},{"propositions":[],"lastnames":["Fang"],"firstnames":["Dongliang"],"suffixes":[]},{"propositions":[],"lastnames":["Zhou"],"firstnames":["Wei"],"suffixes":[]},{"propositions":["Van","der"],"lastnames":["Kouwe"],"firstnames":["Erik"],"suffixes":[]},{"propositions":[],"lastnames":["Li"],"firstnames":["Yin"],"suffixes":[]},{"propositions":[],"lastnames":["Zhang"],"firstnames":["Yiqing"],"suffixes":[]}],"month":"June","year":"2023","keywords":"proj_vulcan, type_conf, type_paper, type_top","bibtex":"@inproceedings{pengCEFICommandExecution2023,\n\ttitle = {{CEFI}: {Command} {Execution} {Flow} {Integrity} for {Embedded} {Devices}},\n\turl = {Paper=https://download.vusec.net/papers/cefi_dimva23.pdf},\n\tbooktitle = {International {Conference} on {Detection} of {Intrusions} and {Malware}, and {Vulnerability} {Assessment}},\n\tauthor = {Peng, Anni and Fang, Dongliang and Zhou, Wei and Van der Kouwe, Erik and Li, Yin and Zhang, Yiqing},\n\tmonth = jun,\n\tyear = {2023},\n\tkeywords = {proj\\_vulcan, type\\_conf, type\\_paper, type\\_top},\n}\n\n","author_short":["Peng, A.","Fang, D.","Zhou, W.","Van der Kouwe, E.","Li, Y.","Zhang, Y."],"urlPaper":"https://download.vusec.net/papers/cefi_dimva23.pdf","key":"pengCEFICommandExecution2023","id":"pengCEFICommandExecution2023","bibbaseid":"peng-fang-zhou-vanderkouwe-li-zhang-ceficommandexecutionflowintegrityforembeddeddevices-2023","role":"author","urls":{"Paper":"https://download.vusec.net/papers/cefi_dimva23.pdf"},"keyword":["proj_vulcan","type_conf","type_paper","type_top"],"metadata":{"authorlinks":{}},"downloads":6},"bibtype":"inproceedings","biburl":"https://download.vusec.net/papers/zotero.php?tag=&full=1&format=bibtex&sort=date","dataSources":["JLGtnQqjNvhKfC2ff","LY5xkJFgS2sBQ9umB","JWcaY4xDbjG3msjWc"],"keywords":["proj_vulcan","type_conf","type_paper","type_top"],"search_terms":["cefi","command","execution","flow","integrity","embedded","devices","peng","fang","zhou","van der kouwe","li","zhang"],"title":"CEFI: Command Execution Flow Integrity for Embedded Devices","year":2023,"downloads":6}