The B-side of side channel leakage: Control flow security in embedded systems

17Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The security of an embedded system is often compromised when a “trusted” program is subverted to behave differently. Such as executing maliciously crafted code and/or skipping legitimate parts of a “trusted” program. Several countermeasures have been proposed in the literature to counteract these behavioural changes of a program. A common underlying theme in most of them is to define security policies at the lower level of the system in an independent manner and then check for security violations either statically or dynamically at runtime. In this paper we propose a novel method that verifies a program’s behaviour, such as the control flow, by using the device’s side channel leakage.

Cite

CITATION STYLE

APA

Msgna, M., Markantonakis, K., & Mayes, K. (2013). The B-side of side channel leakage: Control flow security in embedded systems. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 127 LNICST, pp. 288–304). Springer Verlag. https://doi.org/10.1007/978-3-319-04283-1_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free