跳到主要导航 跳到搜索 跳到主要内容

Architectural-enhanced intrusion detection and memory authentication schemes in embedded systems

  • Lin Wang*
  • , Xiang Wang
  • , Zichen Zhou
  • , Qinghai Liu
  • , Hao Yang
  • *此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

A number of shocking cyber-attacks have happened in recent years, and the damage they have caused has led to the emergence of cyber-security as a consideration when designing embedded systems. Software vulnerability and physical attack are the most severe threats the system face. This paper provides information about hardware designed to monitor potential intrusions and incidences of unauthorized access. Crucially, it can also trace execution patterns and cryptographic schemes in relation to memory authentication. The automated compiler extracts the intrusion detection model and covers the important instructions with cipher text at the compile time. At runtime, the proposed hardware monitors the instructions that change program trace and access memory data, which ensure the process and data follow the permissible behavior and resist the potential attacks. The security analysis shows that the proposed techniques can recognize and eliminate a wide range of common software and physical threats with low performance penalties and minimal overhead.

源语言英语
主期刊名Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
221-224
页数4
DOI
出版状态已出版 - 2010
活动2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010 - Beijing, 中国
期限: 17 12月 201019 12月 2010

出版系列

姓名Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010

会议

会议2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
国家/地区中国
Beijing
时期17/12/1019/12/10

指纹

探究 'Architectural-enhanced intrusion detection and memory authentication schemes in embedded systems' 的科研主题。它们共同构成独一无二的指纹。

引用此