System and method for validating program execution at run-time

K Ghose - US Patent 9,767,271, 2017 - Google Patents
(57) ABSTRACT A pipelined processor comprising a cache memory system, fetching
instructions for execution from a portion of said cache memory system, an instruction …

Hardware support for secure processing in embedded systems

S Mao, T Wolf - Proceedings of the 44th annual Design Automation …, 2007 - dl.acm.org
The inherent limitations of embedded systems make them particularly vulnerable to attacks.
We have developed a hardware monitor that operates in parallel to the embedded …

System and method for validating program execution at run-time using control flow signatures

K Ghose - US Patent 8,782,435, 2014 - Google Patents
Ostrolenk Faber LLP (57) ABSTRACT A processor comprising: an instruction processing
pipeline, configured to receive a sequence of instructions for execution, said sequence …

[图书][B] Emerging topics in hardware security

M Tehranipoor - 2021 - Springer
Hardware security, so unknown to many in the domain of cyber security over the past four
decades, has now become a household terminology in many organizations, companies, and …

[图书][B] High-performance embedded computing: applications in cyber-physical systems and mobile computing

M Wolf - 2014 - books.google.com
High-Performance Embedded Computing, Second Edition, combines leading-edge
research with practical guidance in a variety of embedded computing topics, including real …

Architectural support for software-based protection

M Budiu, U Erlingsson, M Abadi - Proceedings of the 1st workshop on …, 2006 - dl.acm.org
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be
subverted by a malicious adversary, even if the adversary has complete control of data …

How secure are checkpoint-based defenses in digital microfluidic biochips?

M Shayan, S Bhattacharjee, R Wille… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
A digital microfluidic biochip (DMFB) is a miniaturized laboratory capable of implementing
biochemical protocols. Fully integrated DMFBs consist of a hardware platform, controller …

Providing secure execution environments with a last line of defense against trojan circuit attacks

G Bloom, B Narahari, R Simha, J Zambreno - computers & security, 2009 - Elsevier
Integrated circuits (ICs) are often produced in foundries that lack effective security controls.
In these foundries, sophisticated attackers are able to insert malicious Trojan circuits that are …

Replacement attacks against vm-protected applications

S Ghosh, J Hiser, JW Davidson - Proceedings of the 8th ACM SIGPLAN …, 2012 - dl.acm.org
Process-level virtualization is increasingly being used to enhance the security of software
applications from reverse engineering and unauthorized modification (called software …

On security issues in embedded systems: challenges and solutions

L Khelladi, Y Challal, A Bouabdallah… - … journal of information …, 2008 - inderscienceonline.com
Ensuring security in embedded systems translates into several design challenges, imposed
by the unique features of these systems. These features make the integration of …