2009
DOI: 10.1016/j.compeleceng.2008.06.010
|View full text |Cite
|
Sign up to set email alerts
|

A compiler-hardware approach to software protection for embedded systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Formula (5) shows that without the random number, there are no input collisions if the key sequence length is less than 2 S ct (the counter value space). In this case, the success probability of the used-key attack is 0.…”
Section: Security Analysismentioning
confidence: 99%
“…Formula (5) shows that without the random number, there are no input collisions if the key sequence length is less than 2 S ct (the counter value space). In this case, the success probability of the used-key attack is 0.…”
Section: Security Analysismentioning
confidence: 99%
“…Such as protections based on varied register codes are software techniques [1][2]. Such as protections based on varied softdogs are hardware techniques [3][4][5]. The main principle of these software techniques is to identify whether the user is authority.…”
Section: Introductionmentioning
confidence: 99%
“…We considered two granularities for code block: (a) the cache block and (b) a basic block of code (segment of code between two branch points). These techniques are presented in detail in publications [2,10] and [4] respectively. By operating at the basic block granularity we can deal with program control flow properties that are intrinsic to the application and independent of the architecture specific parameters such as cache block size, and size of cache.…”
Section: Threat Modelsmentioning
confidence: 99%
“…In addition to exploring the design of the FPGA logic to support the security techniques (discussed in [2,4,10]), complementary uses of FPGA architectures for other secure software applications were also explored. In particular two architectural solutions were devised and tested -(i) processor-memory bus encryption and (ii) network intrusion detection.…”
Section: Fpga Architecture Designmentioning
confidence: 99%
See 1 more Smart Citation