International audienceEmbedded systems often implement safety critical applications making security a more and more important aspect in their design. Control-Flow Integrity (CFI) attacks are used to modify program behavior and can lead to learn valuable information directly or indirectly by perturbing a system and creating failures. Although CFI attacks are well-known in computer systems, they have been recently shown to be practical and feasible on embedded systems as well. In this context, CFI checks are mainly used to detect unintended software behaviors while very few works address non programmable hardware component monitoring. In this paper, we present a hardware-assisted paradigm to enhance embedded system security by detecting and p...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceSecurity and safety are more and more important in embedded system design. A k...
International audienceSecurity and safety are more and more important in embedded system design. A k...
International audienceSecurity and safety are more and more important in embedded system design. A k...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
A popular software attack on a program is by transferring the program control to malicious code inse...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceEmbedded systems often implement safety critical applications making security ...
International audienceSecurity and safety are more and more important in embedded system design. A k...
International audienceSecurity and safety are more and more important in embedded system design. A k...
International audienceSecurity and safety are more and more important in embedded system design. A k...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
A popular software attack on a program is by transferring the program control to malicious code inse...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...