{SoK}:{Where's} the {“up”?}! A Comprehensive (bottom-up) Study on the Security of Arm {Cortex-M} Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - 18th USeNIX WOOT …, 2024 - usenix.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …

Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - arXiv preprint arXiv …, 2024 - arxiv.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …

Sustainable Financing for Transport Infrastructure: An Integral Approach for the Russian Federation

A Chupin, A Sorokin, A Veselko, D Morkovkin… - Sustainability, 2024 - mdpi.com
The development of global transport infrastructure is a crucial aspect of economic growth
and prosperity. In this study, the main trends in the development of global transport …

Control-Flow Security for Microcontroller-Based Systems

X Tan - 2024 - search.proquest.com
Microcontrollers are widely used among embedded and internet-of-things devices, powering
various products such as medical devices, smart home devices, and industrial control units …

Shadow stack performance evaluation in RISC-V architecture

HY Kang, SH Park, DH Kwon - Annual Conference of KIPS, 2024 - koreascience.kr
본 연구에서는 RISC-V 아키텍처를 대상으로 쉐도우 스택을 적용한 벤치마크의 성능을
평가하였다. 이를 통해 RISC-V 아키텍처 상에서 쉐도우 스택이 가지는 성능 오버헤드를 …

Investigating Security Studies Using MPU on Cortex-M Processors

YJ Gu, HY Kang, DH Kwon - Annual Conference of KIPS, 2024 - koreascience.kr
Abstract Cortex-M 프로세서는 가상 메모리를 지원하는 MMU 를 제공하지 않는 대신 메모리
보호 옵션으로 MPU 를 제공한다. MPU 를 사용해 특정 메모리 영역에 대한 접근 권한과 속성을 …

[PDF][PDF] Once upon a time in IoT: an industry-grade OS perspective for IoT security

P Hameau, V Servant, P Thierry, F Valette - sstic.org
Last year [24] we started to work on a separated deported UI 1 designed to support an
efficient secured and trusted display management with enhanced security level as …