2018
DOI: 10.1088/1757-899x/466/1/012070
|View full text |Cite
|
Sign up to set email alerts
|

Hardware-Based Protection for Data Security at Run-Time on Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The hash-oriented integrity checking method is well known for its low collision probability, but the computation is quite complicated. Taking into consideration the constraints of embedded processor resources and other factors, the lightweight hash function (LHash) we proposed previously [16] is utilized to calculate the digest. DIG cal is the calculated digest of BB in run-time and obtained by the same method as DIG re f .…”
Section: Sourcementioning
confidence: 99%
See 2 more Smart Citations
“…The hash-oriented integrity checking method is well known for its low collision probability, but the computation is quite complicated. Taking into consideration the constraints of embedded processor resources and other factors, the lightweight hash function (LHash) we proposed previously [16] is utilized to calculate the digest. DIG cal is the calculated digest of BB in run-time and obtained by the same method as DIG re f .…”
Section: Sourcementioning
confidence: 99%
“…We could determine the boundary by identifying the jump instruction. With decoding each executing instruction, we adopted a lightweight hash function [16] to calculate the digest value of current BB denoted as DIG cal . Meanwhile, SMU would search the corresponding reference digest (DIG re f ) from M-Cache or memory according to the EA start of current BB.…”
Section: Overall Structurementioning
confidence: 99%
See 1 more Smart Citation