Semantics-based online malware detection: Towards efficient real-time protection against malware

S Das, Y Liu, W Zhang… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Recently, malware has increasingly become a critical threat to embedded systems, while the
conventional software solutions, such as antivirus and patches, have not been so successful …

A fine-grained control flow integrity approach against runtime memory attacks for embedded systems

S Das, W Zhang, Y Liu - … on Very Large Scale Integration (VLSI …, 2016 - ieeexplore.ieee.org
Runtime attacks on memory, such as buffer overflow based stack smashing and code reuse
attacks, are common in embedded systems. Control flow integrity (CFI) has been …

A hardware security-monitoring architecture based on data integrity and control flow integrity for embedded systems

Q Hao, Z Zhang, D Xu, J Wang, J Liu, J Zhang, J Ma… - Applied Sciences, 2022 - mdpi.com
As technology evolves, embedded systems access more networks and devices, which
means more security threats. Existing security-monitoring methods with a single parameter …

High-efficiency parallel cryptographic accelerator for real-time guaranteeing dynamic data security in embedded systems

Z Zhang, X Wang, Q Hao, D Xu, J Zhang, J Liu, J Ma - Micromachines, 2021 - mdpi.com
Dynamic data security in embedded systems is raising more and more concerns in
numerous safety-critical applications. In particular, the data exchanges in embedded …

Hardware-enhanced protection for the runtime data security in embedded systems

W Wang, X Zhang, Q Hao, Z Zhang, B Xu, H Dong… - Electronics, 2019 - mdpi.com
At present, the embedded systems are facing various kinds of attacks, especially for the data
stored in the external memories. This paper presents a hardware-enhanced protection …

Hardware performance counters based runtime anomaly detection using SVM

MFB Abbas, SP Kadiyala, A Prakash… - 2017 TRON …, 2017 - ieeexplore.ieee.org
The nature of ever evolving anomalies have become more sophisticated and complex in
attacking the defense schemes, thereby leading to serious compromises. Existing software …

LAMBDA: Lightweight assessment of malware for emBeddeD architectures

SP Kadiyala, M Alam, Y Shrivastava… - ACM Transactions on …, 2020 - dl.acm.org
Security is a critical aspect in many of the latest embedded and IoT systems. Malware is one
of the severe threats of security for such devices. There have been enormous efforts in …

Influence of electrical parameters on UHF radio propagation in tunnels

S Jiping, C Lingfei, L Xiaoyang - APCC/MDMC'04. The 2004 …, 2004 - ieeexplore.ieee.org
Characteristics of radio propagation in tunnels are influenced by several factors, such as the
shape and transverse dimensions of tunnels, the frequency, the direction of polarization and …

On enhancing the debug architecture of a system-on-chip (SoC) to detect software attacks

J Backer, D Hély, R Karri - … on Defect and Fault Tolerance in …, 2015 - ieeexplore.ieee.org
The prevalent use of systems-on-chip (SoCs) makes them prime targets for software attacks.
Proposed security countermeasures monitor software execution in real-time, but are …

Controlling your control flow graph

A Kanuparthi, J Rajendran… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Code Reuse Attacks (CRAs) are software exploits in which an attacker directs program
control flow through existing code without injecting malicious code to achieve his objective …