Advancing IoT Security Through Run-time Monitoring & Post-Execution Verification
This paper, for the first time, proposes the joint application of run-time monitoring and post-
execution verification methods to protect the integrity of AES encryption on Internet-of-Things …
execution verification methods to protect the integrity of AES encryption on Internet-of-Things …
Low-cost control flow protection via available redundancies in the microprocessor pipeline
MA Rouf, S Kim - IEEE Transactions on Very Large Scale …, 2014 - ieeexplore.ieee.org
Miniaturization of very large scale integration circuits, higher frequencies and reduction of
supply voltages make embedded systems more susceptible to soft errors (or transient …
supply voltages make embedded systems more susceptible to soft errors (or transient …
[PDF][PDF] A Review on Fault Tolerant Techniques and Issues in Modern Processors
MA Rouf, MWR Mia, S Kim - 2019 - researchgate.net
Processors in embedded systems, in microcomputers and even in servers are highly
induced by soft errors because of miniaturization of VLSI circuits and reduction of voltage …
induced by soft errors because of miniaturization of VLSI circuits and reduction of voltage …