Hardware-Based Run-Time Code Integrity in Embedded Devices

Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively increasing plethora of software vulnerabilities. One of the most dangerous types of these attacks targets application code at run-time. Techniques to detect such attacks typically rely on software due...

Full description

Bibliographic Details
Main Authors: Taimour Wehbe, Vincent Mooney, David Keezer
Format: Article
Language:English
Published: MDPI AG 2018-08-01
Series:Cryptography
Subjects:
Online Access:http://www.mdpi.com/2410-387X/2/3/20