Hardware-Based Run-Time Code Integrity in Embedded Devices
Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively increasing plethora of software vulnerabilities. One of the most dangerous types of these attacks targets application code at run-time. Techniques to detect such attacks typically rely on software due...
Main Authors: | Taimour Wehbe, Vincent Mooney, David Keezer |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-08-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | http://www.mdpi.com/2410-387X/2/3/20 |
Similar Items
-
Towards Trust Hardware Deployment of Edge Computing: Mitigation of Hardware Trojans based on Evolvable Hardware
by: Huang, Z., et al.
Published: (2022) -
A Novel Ultra-Compact FPGA PUF: The DD-PUF
by: Riccardo Della Sala, et al.
Published: (2021-09-01) -
EFIC-ME: A Fast Emulation Based Fault Injection Control and Monitoring Enhancement
by: Zain Ul Abideen, et al.
Published: (2020-01-01) -
Secure Boot for Reconfigurable Architectures
by: Ali Shuja Siddiqui, et al.
Published: (2020-09-01) -
Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT
by: Hussain Al-Aqrabi, et al.
Published: (2020-03-01)