Architectural enhancements for secure embedded processing

  • Arora D
  • Ravi S
  • Raghunathan A
  • et al.
N/ACitations
Citations of this article
4Readers
Mendeley users who have this article in their library.

Abstract

In this paper, we present architectural enhancements for ensuringsecure execution of programs on embedded processors. The primarymotivation behind this work is that software attacks often originatefrom unknown vulnerabilities in trusted programs. We propose twotechniques to achieve secure program execution. They include (i)hardware-assisted monitoring of a trusted program's control flowto detect deviant control flow, and (ii) hardware-assisted validationof a program's data properties that may be violated in the eventof an attack. Experiments show that the proposed architecture canbe very effective in preventing a wide range of security threats.

Cite

CITATION STYLE

APA

Arora, D., Ravi, S., Raghunathan, A., & Jha, N. K. (2006). Architectural enhancements for secure embedded processing. NATO Security Through Science Series D-Information and Communication Security, 2, 18.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free