2007 IEEE/ACS International Conference on Computer Systems and Applications 2007
DOI: 10.1109/aiccsa.2007.370926
|View full text |Cite
|
Sign up to set email alerts
|

Simulation of a Secure CPU with SecureTag Technique to Defend Embedded Systems Against Buffer Overflow Attacks

Abstract: The research on security issues is getting more important, as the number of embedded and networked computing systems is constantly increasing. Due to strict restrictions and strong requirements, only special software applications can be used in security-critical embedded systems. So, it is necessary to secure those software applications with a special hardware implementation of a secure processor architecture.In this paper, we propose the architecture of the Secure CPU, including a memory structure using the S… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…The research area of data integrity and confidentiality is now very active. Many work presented new schemes for uniprocessor [7][8][9][10][11][12][13][14] and multi-processors platform [15][16][17][18]. In this paper we focused on the integrity protection scheme of uniprocessor.…”
Section: Related Workmentioning
confidence: 99%
“…The research area of data integrity and confidentiality is now very active. Many work presented new schemes for uniprocessor [7][8][9][10][11][12][13][14] and multi-processors platform [15][16][17][18]. In this paper we focused on the integrity protection scheme of uniprocessor.…”
Section: Related Workmentioning
confidence: 99%