Hardware-Based Run-Time Code Integrity in Embedded Devices
Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively increasing plethora of software vulnerabilities. One of the most dangerous types of these attacks targets application code at run-time. Techniques to detect such attacks typically rely on software due...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-08-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | http://www.mdpi.com/2410-387X/2/3/20 |