2021
DOI: 10.1155/2021/2914192
|View full text |Cite
|
Sign up to set email alerts
|

NSGA-II-Based Granularity-Adaptive Control-Flow Attestation

Abstract: Since the widespread adoption of edge computing and IoT technology, Control-Flow Hijacking (CFH) attacks targeting programs in resource-constrained embedded devices have become prevalent. While the Coarse-Grained Control-Flow integrity Attestation (CGCFA) lacks accuracy for the CFH attacks detection, the Fine-Grained Control-Flow integrity Attestation (FGCFA) detect the attacks more accurately but with high overheads, which can be a big burden (e.g., to industrial control system with strict performance require… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…e experimental results of the runtime overhead are shown in Table 5. We compare the MGC-FA [7] and GACFA [8] with our BDFCFA scheme. e experimental data on the runtime overhead of MGC-FA come from the literature [7].…”
Section: Runtime Overhead Evaluationmentioning
confidence: 99%
See 4 more Smart Citations
“…e experimental results of the runtime overhead are shown in Table 5. We compare the MGC-FA [7] and GACFA [8] with our BDFCFA scheme. e experimental data on the runtime overhead of MGC-FA come from the literature [7].…”
Section: Runtime Overhead Evaluationmentioning
confidence: 99%
“…e scheme when p = 0 is the same as the control flow checking scheme in the literature [33], and the scheme when p = 1 is the same as the control flow checking scheme in the literature [8]. Runtime overhead is the average value obtained after the experiment is repeated many times.…”
Section: Runtime Overhead Evaluationmentioning
confidence: 99%
See 3 more Smart Citations