2019 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2019
DOI: 10.23919/date.2019.8714997
|View full text |Cite
|
Sign up to set email alerts
|

Secure Intermittent Computing Protocol: Protecting State Across Power Loss

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Ghodsi et al [22] use lightweight algorithms [12] for securing checkpoints. Valea et al [58] propose a SECure Context Saving (SECCS) hardware module inside the MCU, whereas Khrishnan et al [37] apply Authenticated Encryption with Associated Data (AEAD) to protect checkpointing data.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Ghodsi et al [22] use lightweight algorithms [12] for securing checkpoints. Valea et al [58] propose a SECure Context Saving (SECCS) hardware module inside the MCU, whereas Khrishnan et al [37] apply Authenticated Encryption with Associated Data (AEAD) to protect checkpointing data.…”
Section: Background and Related Workmentioning
confidence: 99%
“…For the intermittent computing systems (EH device), a side-channel attack for energy is presented in [175]. These devices save programs state as checkpoints during the period of power loss into non-volatile memory.…”
Section: Device Tamperingmentioning
confidence: 99%