Detection and isolation of false data injection attack for smart grids via unknown input observers

X Luo, X Wang, X Pan, X Guan - IET Generation, Transmission …, 2019 - Wiley Online Library
The emergence of cyber‐physical attacks brings a key challenge to the existing system
integrity protection schemes (SIPSs) of smart grids. As one of typical cyber‐physical attacks …

Flexible privilege management for microcontroller-class RISC-V cores

A Cilardo, S Mercogliano - Microelectronics Reliability, 2022 - Elsevier
The trustworthiness of microcontroller-class devices is crucial for a growing spectrum of
applications involving embedded and industrial systems, ranging from robotics to avionics …

Optimizing CNN Computation Using RISC-V Custom Instruction Sets for Edge Platforms

S Wang, X Wang, Z Xu, B Chen, C Feng… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Benefit from the custom instruction extension capabilities, RISC-V architecture can be
optimized for many domain-specific applications. In this paper, we propose seven RISC-V …

ALEXIA: A processor with lightweight extensions for memory safety

G Krishnakumar, KA Reddy, C Rebeiro - ACM Transactions on …, 2019 - dl.acm.org
Illegal use of memory pointers is a serious security vulnerability. A large number of
malwares exploit the spatial and temporal nature of these vulnerabilities to subvert …

[PDF][PDF] A Secure Canary-Based Hardware Approach Against ROP.

MS Roodsari, E Nouri, F Sheikhshoaei, P Prinetto… - ITASEC, 2022 - ceur-ws.org
With the growing demand for embedded systems, from home appliances to industrial usage,
security is a significant challenge. Return-oriented programming (ROP) and Code reuse …

РАСШИРЕНИЕ ВОЗМОЖНОСТЕЙ CLANG STATIC ANALYZER ДЛЯ ОБНАРУЖЕНИЯ НОВЫХ УЯЗВИМОСТЕЙ

МВ Рудик, ИЮ Коркин - Естественные и технические науки, 2021 - elibrary.ru
Тестирование и поиск ошибок в программном обеспечении является неотъемлемой
частью цикла его разработки. Ошибки в программном коде несут угрозу …