2015
DOI: 10.1016/j.microrel.2015.07.021
|View full text |Cite
|
Sign up to set email alerts
|

ShadowStack: A new approach for secure program execution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…The need to include security mechanisms in electronic tiny devices has dramatically grown with the widespread use of such devices in our daily life [1][2][3]. In this scenario this work presents a hardware-based approach, here denoted as a watchdog connected to the Peripheral Component Interconnect Express (PCIe) bus, which aims at preventing I/O attacks during system boot.…”
Section: Introductionmentioning
confidence: 99%
“…The need to include security mechanisms in electronic tiny devices has dramatically grown with the widespread use of such devices in our daily life [1][2][3]. In this scenario this work presents a hardware-based approach, here denoted as a watchdog connected to the Peripheral Component Interconnect Express (PCIe) bus, which aims at preventing I/O attacks during system boot.…”
Section: Introductionmentioning
confidence: 99%
“…In the sequence, this work proposes a way to securely recover the system from the intrusion detection event. The preliminaries of this work were first published in [1], where the detection mechanism was first introduced. The present paper represents a continuation of this work, by introducing the recovery process, after the intrusion detection event by the watchdog.…”
Section: Introductionmentioning
confidence: 99%