Advancing IoT Security Through Run-time Monitoring & Post-Execution Verification

M Dehghani, M Elahi, M Fazeli… - 2024 IEEE Computer …, 2024 - ieeexplore.ieee.org
This paper, for the first time, proposes the joint application of run-time monitoring and post-
execution verification methods to protect the integrity of AES encryption on Internet-of-Things …

Low-cost control flow protection via available redundancies in the microprocessor pipeline

MA Rouf, S Kim - IEEE Transactions on Very Large Scale …, 2014 - ieeexplore.ieee.org
Miniaturization of very large scale integration circuits, higher frequencies and reduction of
supply voltages make embedded systems more susceptible to soft errors (or transient …

[PDF][PDF] A Review on Fault Tolerant Techniques and Issues in Modern Processors

MA Rouf, MWR Mia, S Kim - 2019 - researchgate.net
Processors in embedded systems, in microcomputers and even in servers are highly
induced by soft errors because of miniaturization of VLSI circuits and reduction of voltage …