Abstract
In this paper, we present architectural enhancements for ensuringsecure execution of programs on embedded processors. The primarymotivation behind this work is that software attacks often originatefrom unknown vulnerabilities in trusted programs. We propose twotechniques to achieve secure program execution. They include (i)hardware-assisted monitoring of a trusted program's control flowto detect deviant control flow, and (ii) hardware-assisted validationof a program's data properties that may be violated in the eventof an attack. Experiments show that the proposed architecture canbe very effective in preventing a wide range of security threats.
Cite
CITATION STYLE
Arora, D., Ravi, S., Raghunathan, A., & Jha, N. K. (2006). Architectural enhancements for secure embedded processing. NATO Security Through Science Series D-Information and Communication Security, 2, 18.
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.