Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- ARM (1)
- Analysis (1)
- Architecture (1)
- Binary (1)
- Ghidra (1)
-
- Intermediate representation (1)
- Internet of things (1)
- Keras (1)
- Key management (1)
- Long short term memory (1)
- Low-power and lossy networks LLN (1)
- Message confidentiality (1)
- Message integrity (1)
- Natural language processing (1)
- Networked resource-constrained devices (1)
- Neural network (1)
- RPL routing protocol (1)
- Similarity detection (1)
- X86 (1)
Articles 1 - 2 of 2
Full-Text Articles in Engineering
Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer
Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer
Browse all Theses and Dissertations
Vulnerabilities in source code can be compiled for multiple processor architectures and make their way into several different devices. Security researchers frequently have no way to obtain this source code to analyze for vulnerabilities. Therefore, the ability to effectively analyze binary code is essential. Similarity detection is one facet of binary code analysis. Because source code can be compiled for different architectures, the need can arise for detecting code similarity across architectures. This need is especially apparent when analyzing firmware from embedded computing environments such as Internet of Things devices, where the processor architecture is dependent on the product and …
Secure Authenticated Key Exchange For Enhancing The Security Of Routing Protocol For Low-Power And Lossy Networks, Sarah Mohammed Alzahrani
Secure Authenticated Key Exchange For Enhancing The Security Of Routing Protocol For Low-Power And Lossy Networks, Sarah Mohammed Alzahrani
Browse all Theses and Dissertations
The current Routing Protocol for Low Power and Lossy Networks (RPL) standard provides three security modes Unsecured Mode (UM), Preinstalled Secure Mode (PSM), and Authenticated Secure Mode (ASM). The PSM and ASM are designed to prevent external routing attacks and specific replay attacks through an optional replay protection mechanism. RPL's PSM mode does not support key replacement when a malicious party obtains the key via differential cryptanalysis since it considers the key to be provided to nodes during the configuration of the network. This thesis presents an approach to implementing a secure authenticated key exchange mechanism for RPL, which ensures …