Preventing memory errors in networked vehicle services through diversification

Hector Marco, Juan Carlos Ruiz, David de Andrés, Ismael Ripoll

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review


Car-to-X communication stands for the communication of different vehicles (vehicle-to-vehicle) as well as for the communication of vehicles and infrastructure (vehicle-to-infrastructure). The development of these technologies promotes the emergence of new car infotainment and telematic services of added value for users. The side effect is the exposure of vehicles to a number of new threats, such as memory errors. Among other consequences, the exploitation of memory errors may lead to code-reuse attacks, where intruders reuse existing non-malicious
code with malicious purposes, such as gaining complete car control. Since memory error exploits usually rely on highly specific processor characteristics, the same exploit rarely works on dfferent hardware architectures. This paper proposes a strategy to thwart memory error exploitation by combining the diversification of HW through processor emulation with the creation of Service variants using offthe-shelf cross-compilation suites.
Original languageEnglish
Title of host publicationComputer Safety, Reliability, and Security
Subtitle of host publication32nd International Conference, SAFECOMP 2013, Toulouse, France, September 14-27, 2013, Proceedings
EditorsFriedemann Bitsch, Jérémie Guiochet, Mohamed Kaâniche
PublisherSpringer-Verlag Berlin Heidelberg GmbH
Number of pages6
ISBN (Electronic)9783642407932
ISBN (Print)9783642407925
Publication statusPublished - 2013
Externally publishedYes
EventSAFECOMP - Workshop CARS - Toulouse, France
Duration: 25 Jul 2013 → …

Publication series

NameProgramming and Software Engineering
PublisherSpringer Nature


WorkshopSAFECOMP - Workshop CARS
Period25/07/13 → …
Internet address


  • car-to-X communications
  • memory errors
  • HW virtualization
  • Cross-compilation


Dive into the research topics of 'Preventing memory errors in networked vehicle services through diversification'. Together they form a unique fingerprint.

Cite this