Security analysis of a system-on-chip using assertion-based verification
P Bhamidipati, SM Achyutha… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Current systems-on-chip designs contain multiple cores which perform a variety of
processing, storage, and communication functions. Complexity of interactions among the …
processing, storage, and communication functions. Complexity of interactions among the …
A fpga-based control-flow integrity solution for securing bare-metal embedded systems
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable
attackers to maliciously take control over the program running on a target machine by forcing …
attackers to maliciously take control over the program running on a target machine by forcing …
Stack redundancy to thwart return oriented programming in embedded systems
With the emergence of Internet of Things, embedded devices are increasingly the target of
software attacks. The aim of these attacks is to maliciously modify the behavior of the …
software attacks. The aim of these attacks is to maliciously modify the behavior of the …
Hardware-assisted security monitoring unit for real-time ensuring secure instruction execution and data processing in embedded systems
X Wang, Z Zhang, Q Hao, D Xu, J Wang, H Jia, Z Zhou - Micromachines, 2021 - mdpi.com
The hardware security of embedded systems is raising more and more concerns in
numerous safety-critical applications, such as in the automotive, aerospace, avionic, and …
numerous safety-critical applications, such as in the automotive, aerospace, avionic, and …
TrustFlow-X: A practical framework for fine-grained control-flow integrity in critical systems
This article addresses the challenges of memory safety in life-critical medical devices. Since
the last decade, healthcare manufacturers have embraced the Internet of Things, pushing …
the last decade, healthcare manufacturers have embraced the Internet of Things, pushing …
Hardware-Implemented Security Processing Unit for Program Execution Monitoring and Instruction Fault Self-Repairing on Embedded Systems
Z Zhang, X Wang, Q Hao, D Xu, J Wang, J Liu, J Ma… - Applied Sciences, 2022 - mdpi.com
Embedded systems are increasingly applied in numerous security-sensitive applications,
such as industrial controls, railway transports, intelligent vehicles, avionics and aerospace …
such as industrial controls, railway transports, intelligent vehicles, avionics and aerospace …
SSPFA: effective stack smashing protection for Android OS
In this paper, we detail why the stack smashing protector (SSP), one of the most effective
techniques to mitigate stack buffer overflow attacks, fails to protect the Android operating …
techniques to mitigate stack buffer overflow attacks, fails to protect the Android operating …
Customized instructions for protection against memory integrity attacks
Customized instructions have typically been used for enhancing the performance of
embedded systems. However, the use of finding dedicated instructions for security has been …
embedded systems. However, the use of finding dedicated instructions for security has been …
An overview of prevention/mitigation against memory corruption attack
One of the most prevalent, ancient and devastating vulnerabilities which is increasing
rapidly is Memory corruption. It is a vulnerability where a memory location contents of a …
rapidly is Memory corruption. It is a vulnerability where a memory location contents of a …
Security Assurance In SoCs and NoCs: Analysis, Specification, and Quantification
P Bhamidipati - 2024 - search.proquest.com
Modern heterogeneous architectures contain multiple cores that perform a variety of
processing, storage, and communication tasks. The complexity of interactions among the …
processing, storage, and communication tasks. The complexity of interactions among the …