2006
DOI: 10.1109/tvlsi.2006.887799
|View full text |Cite
|
Sign up to set email alerts
|

Hardware-Assisted Run-Time Monitoring for Secure Program Execution on Embedded Processors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 71 publications
(49 citation statements)
references
References 13 publications
0
49
0
Order By: Relevance
“…In these presented approaches, the methods to detect anomalies depend on monitoring the control flow execution of an application [7,8,24,25] or rely on instruction-based monitoring [26][27][28]. In the former, static analysis of expected program behavior is extracted and then used by hardware monitors to observe the program's execution trace.…”
Section: Prior Workmentioning
confidence: 99%
“…In these presented approaches, the methods to detect anomalies depend on monitoring the control flow execution of an application [7,8,24,25] or rely on instruction-based monitoring [26][27][28]. In the former, static analysis of expected program behavior is extracted and then used by hardware monitors to observe the program's execution trace.…”
Section: Prior Workmentioning
confidence: 99%
“…For example, [10] describes a CF method, where the CFG is implemented in a FSM and the lookup table for resolving the control flow instruction addresses and indexes is implemented in memories.…”
Section: Control Flow (Cf) Methodsmentioning
confidence: 99%
“…Related work on control flow checking can be divided into approaches using an additional hardware checker unit or a watchdog processor [6][7][8][9][10], and approaches which are completely software-based [11]. In these approaches, the program code is first structured into basic blocks 1 .…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations