The Community for Technology Leaders
Green Image
Issue No. 06 - June (2010 vol. 59)
ISSN: 0018-9340
pp: 847-854
Shufu Mao , University of Massachusetts Amherst, Amherst
Tilman Wolf , University of Massachusetts Amherst, Amherst
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to an embedded processor and detects any attack that causes the embedded processor to deviate from its originally programmed behavior. We explore several different characteristics that can be used for monitoring and quantify trade-offs between these approaches. Our results show that our proposed hash-based monitoring pattern can detect attacks within one instruction cycle at lower memory requirements than traditional approaches that use control flow information.
Embedded system security, processing monitor, security enforcement.

T. Wolf and S. Mao, "Hardware Support for Secure Processing in Embedded Systems," in IEEE Transactions on Computers, vol. 59, no. , pp. 847-854, 2010.
93 ms
(Ver 3.3 (11022016))