A survey of recent advances in edge-computing-powered artificial intelligence of things

Z Chang, S Liu, X Xiong, Z Cai… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has created a ubiquitously connected world powered by a
multitude of wired and wireless sensors generating a variety of heterogeneous data over …

A Survey on Thwarting Memory Corruption in RISC-V

M Brohet, F Regazzoni - ACM Computing Surveys, 2023 - dl.acm.org
With embedded devices becoming more pervasive and entrenched in society, it is
paramount to keep these systems secure. A threat plaguing these systems consists of …

A survey on risc-v security: Hardware and architecture

T Lu - arXiv preprint arXiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …

Fac-v: An fpga-based aes coprocessor for risc-v

T Gomes, P Sousa, M Silva, M Ekpanyapong… - Journal of Low Power …, 2022 - mdpi.com
In the new Internet of Things (IoT) era, embedded Field-Programmable Gate Array (FPGA)
technology is enabling the deployment of custom-tailored embedded IoT solutions for …

Designing low-power RISC-V multicore processors with a shared lightweight floating point unit for IoT endnodes

J Park, K Han, E Choi, JJ Lee, K Lee… - … on Circuits and …, 2024 - ieeexplore.ieee.org
The increasing interest in RISC-V from both academia and industry has motivated the
development and release of a number of free, open-source cores based on the RISC-V …

A Lightweight AES Coprocessor Based on RISC‐V Custom Instructions

L Pan, G Tu, S Liu, Z Cai, X Xiong - Security and …, 2021 - Wiley Online Library
With the increasing popularity of the Internet of Things (IoT), the issue of its information
security has drawn more and more attention. To overcome the resource constraint barrier for …

Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology

S Li, W Wang, W Li, D Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to
manipulate the standard program execution path, resulting in abnormal processor …

Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems

X Tan, S Mohan, M Armanuzzaman, Z Ma… - Proceedings of the 39th …, 2024 - dl.acm.org
Microcontroller units (MCUs) are compact computers tailored for embedded and Internet-of-
Things (IoT) applications. MCU-based devices primarily run software systems coded in low …

A simple countermeasure to mitigate buffer overflow attack using minimalistic hardware-integrated software simulation for FPGA

S Sayeeshwari, E Prabhu - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Buffer overflow attack in FPGAs is a persisting problem in the industry and various solutions
to mitigate these vulnerabilities are continuously being addressed by manufacturers. A …

Some Security Aspects of Batteries and Power Electronic Converters in a Microgrid

L Matić, K Draženović, V Šunde, Ž Ban - IEEE access, 2023 - ieeexplore.ieee.org
The motivation to write this paper is a need to contribute to research of methods of defence
against intentional attacks on components of hybrid power systems (microgrids) based on …