DocumentCode :
2087350
Title :
Architectural-enhanced intrusion detection and memory authentication schemes in embedded systems
Author :
Wang, Lin ; Wang, Xiang ; Zhou, Zichen ; Liu, Qinghai ; Yang, Hao
Author_Institution :
Sch. of Electron. & Inf. Eng., Beihang Univ., Beijing, China
fYear :
2010
fDate :
17-19 Dec. 2010
Firstpage :
221
Lastpage :
224
Abstract :
A number of shocking cyber-attacks have happened in recent years, and the damage they have caused has led to the emergence of cyber-security as a consideration when designing embedded systems. Software vulnerability and physical attack are the most severe threats the system face. This paper provides information about hardware designed to monitor potential intrusions and incidences of unauthorized access. Crucially, it can also trace execution patterns and cryptographic schemes in relation to memory authentication. The automated compiler extracts the intrusion detection model and covers the important instructions with cipher text at the compile time. At runtime, the proposed hardware monitors the instructions that change program trace and access memory data, which ensure the process and data follow the permissible behavior and resist the potential attacks. The security analysis shows that the proposed techniques can recognize and eliminate a wide range of common software and physical threats with low performance penalties and minimal overhead.
Keywords :
cryptography; embedded systems; software engineering; architectural enhanced intrusion detection; cryptographic scheme; cyber security; embedded system; memory authentication; software vulnerability; unauthorized access; Binary codes; Computer architecture; Embedded systems; Hardware; Monitoring; Security; architectural-enhanced; embedded system; intrusion detection; memory authentication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-6942-0
Type :
conf
DOI :
10.1109/ICITIS.2010.5688775
Filename :
5688775
Link To Document :
بازگشت