Embedded System Confidentiality Protection by Cryptographic Engine Implemented with Composite Field Arithmetic
暂无分享,去创建一个
Qiang Hao | Xiaobing Zhang | Wang Xiang | Bin Xu | Wang Weike | Zhun Zhang | Yuntong Tian | Du Pei
[1] Edward J. McCluskey,et al. Control-flow checking by software signatures , 2002, IEEE Trans. Reliab..
[2] Bin Xu,et al. A novel security validation in embedded system , 2017, 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS).
[3] Wei Zhang,et al. A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[4] Stephen Taylor,et al. Memory encryption , 2014, ACM Comput. Surv..
[5] Aleksandar Milenkovic,et al. Security extensions for integrity and confidentiality in embedded processors , 2009, Microprocess. Microsystems.
[6] Yunheung Paek,et al. Integration of ROP/JOP monitoring IPs in an ARM-based SoC , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[7] Marco Ramilli,et al. Return-Oriented Programming , 2012, IEEE Security & Privacy.
[8] Petru Eles,et al. Optimization of Message Encryption for Real-Time Applications in Embedded Systems , 2018, IEEE Transactions on Computers.
[9] Zhenkai Liang,et al. Jump-oriented programming: a new class of code-reuse attack , 2011, ASIACCS '11.
[10] Ming Fan,et al. Improving AES Core Performance via an Advanced ASBUS Protocol , 2018, ACM J. Emerg. Technol. Comput. Syst..
[11] Shay Gueron. Attacks on Encrypted Memory and Constructions for Memory Protection , 2016, 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[12] Artemios G. Voyiatzis,et al. Security challenges in embedded systems , 2013, ACM Trans. Embed. Comput. Syst..