2008 IEEE International Workshop on Hardware-Oriented Security and Trust 2008
DOI: 10.1109/hst.2008.4559063
|View full text |Cite
|
Sign up to set email alerts
|

Extended abstract: An embedded flash memory vault for software Trojan protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2010
2010

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…The main focus of this paper is a novel vault architecture which operates in tandem with the memory subsystem and protects it from instruction code corruption [2]. The proposed hardware vault architecture consists of a shadow RAM or shadow Cache, flash memory, and a vault manager.…”
Section: Introductionmentioning
confidence: 99%
“…The main focus of this paper is a novel vault architecture which operates in tandem with the memory subsystem and protects it from instruction code corruption [2]. The proposed hardware vault architecture consists of a shadow RAM or shadow Cache, flash memory, and a vault manager.…”
Section: Introductionmentioning
confidence: 99%
“…Then in [69], a one-time pad is used in combination with a CRC-based integrity checker to secure the memory. Finally, [73], utilizes a shadow memory that is initialized by a trusted person and then cannot be altered. Calls are checked with the shadow memory and differences signal an attack.…”
Section: Trustmentioning
confidence: 99%