The dynamics of innocent flesh on the bone: code reuse ten years later

The dynamics of innocent flesh on the bone: code reuse ten years later van der Veen et al., CCS’17 It’s been ten years since the publication of “The geometry of innocent flesh on the bone,” the paper that introduce the notion of Return Oriented Programming and use of gadgets to craft exploits. In the intervening … Continue reading The dynamics of innocent flesh on the bone: code reuse ten years later

Hindsight: understanding the evolution of UI vulnerabilities in mobile browsers

Hindsight: understanding the evolution of UI vulnerabilities in mobile browsers Luo et al., CCS’17 Towards the end of last year, browsing on mobile devices overtook browsing on the desktop. And so when we think about mobile security, in addition to thinking about malicious applications, we also need to start thinking much more seriously about mobile … Continue reading Hindsight: understanding the evolution of UI vulnerabilities in mobile browsers

Analyzing software requirements errors in safety-critical embedded systems

Analyzing software requirements errors in safety-critical embedded systems Lutz, IEEE Requirements Engineering, 1993 With thanks once more to @Di4naO (Thomas Depierre) who first brought this paper to my attention. We’re going even further back in time today to 1993, and a paper analysing safety-critical software errors uncovered during integration and system testing of the Voyager … Continue reading Analyzing software requirements errors in safety-critical embedded systems