Semantics-based online malware detection: Towards efficient real-time protection against malware
Recently, malware has increasingly become a critical threat to embedded systems, while the
conventional software solutions, such as antivirus and patches, have not been so successful …
conventional software solutions, such as antivirus and patches, have not been so successful …
A fine-grained control flow integrity approach against runtime memory attacks for embedded systems
Runtime attacks on memory, such as buffer overflow based stack smashing and code reuse
attacks, are common in embedded systems. Control flow integrity (CFI) has been …
attacks, are common in embedded systems. Control flow integrity (CFI) has been …
A hardware security-monitoring architecture based on data integrity and control flow integrity for embedded systems
Q Hao, Z Zhang, D Xu, J Wang, J Liu, J Zhang, J Ma… - Applied Sciences, 2022 - mdpi.com
As technology evolves, embedded systems access more networks and devices, which
means more security threats. Existing security-monitoring methods with a single parameter …
means more security threats. Existing security-monitoring methods with a single parameter …
High-efficiency parallel cryptographic accelerator for real-time guaranteeing dynamic data security in embedded systems
Z Zhang, X Wang, Q Hao, D Xu, J Zhang, J Liu, J Ma - Micromachines, 2021 - mdpi.com
Dynamic data security in embedded systems is raising more and more concerns in
numerous safety-critical applications. In particular, the data exchanges in embedded …
numerous safety-critical applications. In particular, the data exchanges in embedded …
Hardware-enhanced protection for the runtime data security in embedded systems
W Wang, X Zhang, Q Hao, Z Zhang, B Xu, H Dong… - Electronics, 2019 - mdpi.com
At present, the embedded systems are facing various kinds of attacks, especially for the data
stored in the external memories. This paper presents a hardware-enhanced protection …
stored in the external memories. This paper presents a hardware-enhanced protection …
Hardware performance counters based runtime anomaly detection using SVM
MFB Abbas, SP Kadiyala, A Prakash… - 2017 TRON …, 2017 - ieeexplore.ieee.org
The nature of ever evolving anomalies have become more sophisticated and complex in
attacking the defense schemes, thereby leading to serious compromises. Existing software …
attacking the defense schemes, thereby leading to serious compromises. Existing software …
LAMBDA: Lightweight assessment of malware for emBeddeD architectures
Security is a critical aspect in many of the latest embedded and IoT systems. Malware is one
of the severe threats of security for such devices. There have been enormous efforts in …
of the severe threats of security for such devices. There have been enormous efforts in …
Influence of electrical parameters on UHF radio propagation in tunnels
S Jiping, C Lingfei, L Xiaoyang - APCC/MDMC'04. The 2004 …, 2004 - ieeexplore.ieee.org
Characteristics of radio propagation in tunnels are influenced by several factors, such as the
shape and transverse dimensions of tunnels, the frequency, the direction of polarization and …
shape and transverse dimensions of tunnels, the frequency, the direction of polarization and …
On enhancing the debug architecture of a system-on-chip (SoC) to detect software attacks
The prevalent use of systems-on-chip (SoCs) makes them prime targets for software attacks.
Proposed security countermeasures monitor software execution in real-time, but are …
Proposed security countermeasures monitor software execution in real-time, but are …
Controlling your control flow graph
A Kanuparthi, J Rajendran… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Code Reuse Attacks (CRAs) are software exploits in which an attacker directs program
control flow through existing code without injecting malicious code to achieve his objective …
control flow through existing code without injecting malicious code to achieve his objective …