Security analysis of a system-on-chip using assertion-based verification

P Bhamidipati, SM Achyutha… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Current systems-on-chip designs contain multiple cores which perform a variety of
processing, storage, and communication functions. Complexity of interactions among the …

A fpga-based control-flow integrity solution for securing bare-metal embedded systems

N Maunero, P Prinetto, G Roascio… - 2020 15th Design & …, 2020 - ieeexplore.ieee.org
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable
attackers to maliciously take control over the program running on a target machine by forcing …

Stack redundancy to thwart return oriented programming in embedded systems

C Bresch, D Hély, A Papadimitriou… - IEEE Embedded …, 2018 - ieeexplore.ieee.org
With the emergence of Internet of Things, embedded devices are increasingly the target of
software attacks. The aim of these attacks is to maliciously modify the behavior of the …

Hardware-assisted security monitoring unit for real-time ensuring secure instruction execution and data processing in embedded systems

X Wang, Z Zhang, Q Hao, D Xu, J Wang, H Jia, Z Zhou - Micromachines, 2021 - mdpi.com
The hardware security of embedded systems is raising more and more concerns in
numerous safety-critical applications, such as in the automotive, aerospace, avionic, and …

TrustFlow-X: A practical framework for fine-grained control-flow integrity in critical systems

C Bresch, D Hély, R Lysecky, S Chollet… - ACM Transactions on …, 2020 - dl.acm.org
This article addresses the challenges of memory safety in life-critical medical devices. Since
the last decade, healthcare manufacturers have embraced the Internet of Things, pushing …

Hardware-Implemented Security Processing Unit for Program Execution Monitoring and Instruction Fault Self-Repairing on Embedded Systems

Z Zhang, X Wang, Q Hao, D Xu, J Wang, J Liu, J Ma… - Applied Sciences, 2022 - mdpi.com
Embedded systems are increasingly applied in numerous security-sensitive applications,
such as industrial controls, railway transports, intelligent vehicles, avionics and aerospace …

SSPFA: effective stack smashing protection for Android OS

H Marco-Gisbert, I Ripoll-Ripoll - International Journal of Information …, 2019 - Springer
In this paper, we detail why the stack smashing protector (SSP), one of the most effective
techniques to mitigate stack buffer overflow attacks, fails to protect the Android operating …

Customized instructions for protection against memory integrity attacks

DB Roy, M Alam, S Bhattacharya… - IEEE Embedded …, 2018 - ieeexplore.ieee.org
Customized instructions have typically been used for enhancing the performance of
embedded systems. However, the use of finding dedicated instructions for security has been …

An overview of prevention/mitigation against memory corruption attack

MJ Khalsan, MO Agyeman - … of the 2nd International Symposium on …, 2018 - dl.acm.org
One of the most prevalent, ancient and devastating vulnerabilities which is increasing
rapidly is Memory corruption. It is a vulnerability where a memory location contents of a …

Security Assurance In SoCs and NoCs: Analysis, Specification, and Quantification

P Bhamidipati - 2024 - search.proquest.com
Modern heterogeneous architectures contain multiple cores that perform a variety of
processing, storage, and communication tasks. The complexity of interactions among the …