2016
DOI: 10.12783/dtetr/ssme-ist2016/4025
|View full text |Cite
|
Sign up to set email alerts
|

Hash Attacks Prevention for Instruction Security in Embedded Monitoring System

Abstract: Embedded security monitoring module is a dedicated hardware that runs parallel with the embedded processor, which is used to monitor the integrity of the data and code to enhance program execution security of embedded system. It uses hardware-supported methods computing a hash value of instructions with the hash algorithm as an official reference value to prevent malicious attacks on the program code. This paper analyzed possible hash algorithm attacks on instructions, and did the prevention research for the m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…However, due to the limited functionality of generic IoT sensors and the restricted range of data types and values they collect, this method cannot defend against rainbow table attacks [10,11]. Wang et al [12] analyzed potential attacks on hash algorithms and designed a protection mechanism against the most effective attack, the rainbow table, by introducing noise into each instruction, significantly increasing the attacker's burden and thus enhancing the security of the monitoring model and protecting instruction information. Qi et al [13] pointed out the misconceptions of traditional MD5 hash algorithms and salted hash algorithms in certain application scenarios.…”
Section: Related Work 21 Data Consistency Verification Based On Hash ...mentioning
confidence: 99%
See 1 more Smart Citation
“…However, due to the limited functionality of generic IoT sensors and the restricted range of data types and values they collect, this method cannot defend against rainbow table attacks [10,11]. Wang et al [12] analyzed potential attacks on hash algorithms and designed a protection mechanism against the most effective attack, the rainbow table, by introducing noise into each instruction, significantly increasing the attacker's burden and thus enhancing the security of the monitoring model and protecting instruction information. Qi et al [13] pointed out the misconceptions of traditional MD5 hash algorithms and salted hash algorithms in certain application scenarios.…”
Section: Related Work 21 Data Consistency Verification Based On Hash ...mentioning
confidence: 99%
“…Zhu et al [15] designed a salted digest model using salting techniques, cryptographic technology, and several basic digest algorithms to address the security and availability issues faced by real-world digest services. Schemes [12][13][14][15] resist rainbow table attacks by adding "salt" as interference information to the original data and using slow hash algorithms to increase the difficulty of dictionary or brute-force attacks. However, the "salt" here acts like a key in asymmetric cryptography, whose security must be ensured through complex cryptographic methods.…”
Section: Related Work 21 Data Consistency Verification Based On Hash ...mentioning
confidence: 99%