2020
DOI: 10.1007/978-3-030-64348-5_25
|View full text |Cite
|
Sign up to set email alerts
|

Brief Announcement: Effectiveness of Code Hardening for Fault-Tolerant IoT Software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…This is also applied in the context of cryptographic software. For example, Zavalyshyn et al (2020) studied the effectiveness of five common software hardening techniques applied to a lightweight block cipher, called PRESENT aimed at resource constrained environments, such as WSN and RFID (Bogdanov et al, 2007). The hardening techniques considered include classic loop hardening, variable duplication, function duplication, decryption in place, and statement based counters, and were evaluated in preventing sensitive data leaks, realising their security and their impact on software performance.…”
Section: Software Self-protectionmentioning
confidence: 99%
See 1 more Smart Citation
“…This is also applied in the context of cryptographic software. For example, Zavalyshyn et al (2020) studied the effectiveness of five common software hardening techniques applied to a lightweight block cipher, called PRESENT aimed at resource constrained environments, such as WSN and RFID (Bogdanov et al, 2007). The hardening techniques considered include classic loop hardening, variable duplication, function duplication, decryption in place, and statement based counters, and were evaluated in preventing sensitive data leaks, realising their security and their impact on software performance.…”
Section: Software Self-protectionmentioning
confidence: 99%
“…Hardening typically involves removing un-necessary functionality. However, in IoT devices, what is or is not essential is more difficult to predict at the outset, and (Zavalyshyn et al, 2020) show that some software hardening techniques can negatively impact system software and its performance. Hardware components, e.g., for tamper resistance can be effective but they add to the cost and the design of the device and also need to managed and used judiciously.…”
Section: Software Self-protectionmentioning
confidence: 99%