Atlas: Application Confidentiality in Compromised Embedded Systems
نویسندگان
چکیده
منابع مشابه
Low latency Solution for Confidentiality and Integrity Checking in Embedded Systems with Off-Chip Memory
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip memory. Our security core is based on one-time pad (OTP) encryption and a CRC integrity check module. These modules safeguard external memories for embedded processors against a series of well-known attacks, including replay attacks, spoofing attacks and relocation attacks. The implementation limi...
متن کاملApplication-Specific Memory Management for Embedded Systems
We propose a methodology to improve the performance of embedded processors running data-intensive applications by allowing embedded software to manage on-chip memory on an application-specific or task-specific basis. We provide this management ability with a novel hardware mechanism, column caching. Column caching provides software with the ability to dynamically partition the cache. Data can b...
متن کاملApplication with MUCOS RTOS on embedded systems
Real-time operating system (RTOS) is a very useful tool for developing the application on embedded boards with least software development effort. Though number of RTOS products are available in the market, μC/OS-II is a freeware with minimum facility and more popular among the hobbyist, researchers and small embedded system developers. The μC/OS-II supports preemptive scheduling which is not ef...
متن کاملApplication-Compliant Networking on Embedded Systems
Network protocol stacks are traditionally encapsulated within system software, forcing the application programmer to use general-purpose communication end-point abstractions. The application programmer is denied the flexibility of implementing application-specific performance improvements. Application-level networking provides the application programmer with the ability to tailor the protocol s...
متن کاملModeling application-specific processors for embedded systems
Embedded systems often have to operate under rigid power and performance constraints. Off-the-shelf processors often cannot meet those requirements, instead Application-Specific Instruction Processors (ASIP) are used that are tuned for the particular system at hand. A popular and powerful way of modeling ASIPs is the use of a Processor Description Language (PDL). These languages capture the int...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2019
ISSN: 1545-5971,1941-0018,2160-9209
DOI: 10.1109/tdsc.2018.2858257