Abstract—Embedded system security is often compromised when “trusted ” software is subverted to result in unintended behavior, such as leakage of sensitive data or execution of mali-cious code. Several countermeasures have been proposed in the literature to counteract these intrusions. A common underlying theme in most of them is to define security policies at the system level in an application-independent manner and check for secu-rity violations either statically or at run time. In this paper, we present a methodology that addresses this issue from a different perspective. It defines correct execution as synonymous with the way the program was intended to run and employs a dedicated hardware monitor to detect and prevent unintended progra...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceEmbedded systems often implement safety critical applications making security ...
We introduce a run-time security monitor for embedded system applications that detects both known an...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Abstract—The inherent limitations of embedded systems make them particularly vulnerable to attacks. ...
With the rapid development of embedded systems, the systems’ security has become more and more impor...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively i...
Embedded processors are being increasingly used in our daily life and have become an important part ...
Abstract—To address computer security issues, a hardware-based intrusion detection technique is prop...
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security feature...
To address computer security issues, a hardware-based intrusion detection technique is proposed. Thi...
This paper proposes an approach for detecting compromised programs by analysing suitable features fr...
This paper proposes an approach for detecting compromised programs by analysing suitable features fr...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceEmbedded systems often implement safety critical applications making security ...
We introduce a run-time security monitor for embedded system applications that detects both known an...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Abstract—The inherent limitations of embedded systems make them particularly vulnerable to attacks. ...
With the rapid development of embedded systems, the systems’ security has become more and more impor...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively i...
Embedded processors are being increasingly used in our daily life and have become an important part ...
Abstract—To address computer security issues, a hardware-based intrusion detection technique is prop...
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security feature...
To address computer security issues, a hardware-based intrusion detection technique is proposed. Thi...
This paper proposes an approach for detecting compromised programs by analysing suitable features fr...
This paper proposes an approach for detecting compromised programs by analysing suitable features fr...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceEmbedded systems often implement safety critical applications making security ...
We introduce a run-time security monitor for embedded system applications that detects both known an...