
Paper: Technology to better protect mobile devices
Researchers from University of California, Irvine have proposed a new algorithm that would screen for system vulnerabilities to such an attack before the devices are deployed. It will be a featured paper at the 2012 IEEE International Conference on Technologies for Homeland Security (HST ’12), 13-15 November in Waltham, Massachusetts, outside Boston.
Zi-Shun Huang will present his paper, "Return-Oriented Vulnerabilities in ARM Executables" during the conference. He will discuss the new algorithm and demonstrate experimental results of detecting vulnerabilities on a Texas Instruments’ Stellaris microcontroller.
The latest vulnerabilities in ARM-based processing systems have been unleashed by the Return-to-Zero-Protection attack.
"Our algorithm for detecting ARM-based vulnerabilities will provide security to the processors before they are deployed," Huang said. "This technology has impact on widespread embedded devices, making them safer and reducing the risk of attack."
