Atlas: Application Confidentiality in Compromised Embedded Systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Low latency Solution for Confidentiality and Integrity Checking in Embedded Systems with Off-Chip Memory

This paper proposes a complete hardware solution for embedded systems that fully protects off-chip memory. Our security core is based on one-time pad (OTP) encryption and a CRC integrity check module. These modules safeguard external memories for embedded processors against a series of well-known attacks, including replay attacks, spoofing attacks and relocation attacks. The implementation limi...

متن کامل

Application-Specific Memory Management for Embedded Systems

We propose a methodology to improve the performance of embedded processors running data-intensive applications by allowing embedded software to manage on-chip memory on an application-specific or task-specific basis. We provide this management ability with a novel hardware mechanism, column caching. Column caching provides software with the ability to dynamically partition the cache. Data can b...

متن کامل

Application with MUCOS RTOS on embedded systems

Real-time operating system (RTOS) is a very useful tool for developing the application on embedded boards with least software development effort. Though number of RTOS products are available in the market, μC/OS-II is a freeware with minimum facility and more popular among the hobbyist, researchers and small embedded system developers. The μC/OS-II supports preemptive scheduling which is not ef...

متن کامل

Application-Compliant Networking on Embedded Systems

Network protocol stacks are traditionally encapsulated within system software, forcing the application programmer to use general-purpose communication end-point abstractions. The application programmer is denied the flexibility of implementing application-specific performance improvements. Application-level networking provides the application programmer with the ability to tailor the protocol s...

متن کامل

Modeling application-specific processors for embedded systems

Embedded systems often have to operate under rigid power and performance constraints. Off-the-shelf processors often cannot meet those requirements, instead Application-Specific Instruction Processors (ASIP) are used that are tuned for the particular system at hand. A popular and powerful way of modeling ASIPs is the use of a Processor Description Language (PDL). These languages capture the int...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2019

ISSN: 1545-5971,1941-0018,2160-9209

DOI: 10.1109/tdsc.2018.2858257