S Mao, T Wolf - Proceedings of the 44th annual Design Automation …, 2007 - dl.acm.org
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded …
K Ghose - US Patent 8,782,435, 2014 - Google Patents
Ostrolenk Faber LLP (57) ABSTRACT A processor comprising: an instruction processing pipeline, configured to receive a sequence of instructions for execution, said sequence …
Hardware security, so unknown to many in the domain of cyber security over the past four decades, has now become a household terminology in many organizations, companies, and …
High-Performance Embedded Computing, Second Edition, combines leading-edge research with practical guidance in a variety of embedded computing topics, including real …
M Budiu, U Erlingsson, M Abadi - Proceedings of the 1st workshop on …, 2006 - dl.acm.org
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data …
A digital microfluidic biochip (DMFB) is a miniaturized laboratory capable of implementing biochemical protocols. Fully integrated DMFBs consist of a hardware platform, controller …
Integrated circuits (ICs) are often produced in foundries that lack effective security controls. In these foundries, sophisticated attackers are able to insert malicious Trojan circuits that are …
S Ghosh, J Hiser, JW Davidson - Proceedings of the 8th ACM SIGPLAN …, 2012 - dl.acm.org
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software …
L Khelladi, Y Challal, A Bouabdallah… - … journal of information …, 2008 - inderscienceonline.com
Ensuring security in embedded systems translates into several design challenges, imposed by the unique features of these systems. These features make the integration of …