@inproceedings{41668ac027354403a06230385813c819,
title = "Architectural-enhanced intrusion detection and memory authentication schemes in embedded systems",
abstract = "A number of shocking cyber-attacks have happened in recent years, and the damage they have caused has led to the emergence of cyber-security as a consideration when designing embedded systems. Software vulnerability and physical attack are the most severe threats the system face. This paper provides information about hardware designed to monitor potential intrusions and incidences of unauthorized access. Crucially, it can also trace execution patterns and cryptographic schemes in relation to memory authentication. The automated compiler extracts the intrusion detection model and covers the important instructions with cipher text at the compile time. At runtime, the proposed hardware monitors the instructions that change program trace and access memory data, which ensure the process and data follow the permissible behavior and resist the potential attacks. The security analysis shows that the proposed techniques can recognize and eliminate a wide range of common software and physical threats with low performance penalties and minimal overhead.",
keywords = "Architectural-enhanced, Embedded system, Intrusion detection, Memory authentication",
author = "Lin Wang and Xiang Wang and Zichen Zhou and Qinghai Liu and Hao Yang",
year = "2010",
doi = "10.1109/ICITIS.2010.5688775",
language = "英语",
isbn = "9781424469406",
series = "Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010",
pages = "221--224",
booktitle = "Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010",
note = "2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010 ; Conference date: 17-12-2010 Through 19-12-2010",
}