Abstract | ||
---|---|---|
The number of attacks on embedded processors is on the rise. Attackers exploit vulnerabilities in the software to launch new attacks and get unauthorized access to sensitive information stored in these devices. Several solutions have been proposed by both the academia and the industry to protect the programs running on these embedded-processor based computer systems. After a description of the several attacks that threaten a computer system, this paper surveys existing defenses - software-based and hardware-based (watchdog checkers, integrity trees, memory encryption, and modification of processor architecture), that protect against such attacks. This paper also provides a comparative discussion of their advantages and disadvantages. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/ISVLSI.2012.64 | ISVLSI |
Keywords | Field | DocType |
memory encryption,new attack,integrity tree,processor security,computer system,processor architecture,sensitive information,unauthorized access,comparative discussion,microarchitecture support,embedded processor,paper survey,authorisation,embedded systems,data integrity | Hardware security module,Computer science,Authorization,Encryption,Exploit,Software,Data integrity,Information sensitivity,Embedded system,Microarchitecture | Conference |
Citations | PageRank | References |
1 | 0.36 | 9 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Arun Kanuparthi | 1 | 40 | 3.90 |
Ramesh Karri | 2 | 2968 | 224.90 |
Gaston Ormazabal | 3 | 3 | 1.47 |
Sateesh Addepalli | 4 | 1500 | 84.99 |