2016
DOI: 10.1051/itmconf/20160703006
|View full text |Cite
|
Sign up to set email alerts
|

Hardware-Assisted System for Program Execution Security of SOC

Abstract: Abstract. With the rapid development of embedded systems, the systems' security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus. In addition, with the rapid growth in the number of embedded systems and wide application, followed embedded hardware attacks are also increasing. This paper presents a new hardware assisted security mechanism to protect the program's code and data, monitoring its normal execution. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 9 publications
(7 reference statements)
0
3
0
Order By: Relevance
“…But these solutions inevitably increase code sizes, bring performance overhead, or are themselves vulnerable to corruption. Wang [4] proposed a hardware assisted module to support program execution security. They divided program code into basic blocks by offline profiling and checking the code integrity at runtime.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…But these solutions inevitably increase code sizes, bring performance overhead, or are themselves vulnerable to corruption. Wang [4] proposed a hardware assisted module to support program execution security. They divided program code into basic blocks by offline profiling and checking the code integrity at runtime.…”
Section: Related Workmentioning
confidence: 99%
“…This may cause a lot of waste in hardware resources due to the storage units have a large area. In the mathematical theory, the finite field of GF (2 8 ) can be built iteratively from GF(2 4 ) using irreducible polynomials:…”
Section: Aes Engine With Composite Field Arithmeticmentioning
confidence: 99%
See 1 more Smart Citation