2022
DOI: 10.1145/3538275
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Control-flow Integrity Techniques for Real-time Embedded Systems

Abstract: Computing systems, including real-time embedded systems, are becoming increasingly connected to allow for more advanced and safer operation. Such embedded systems are also often resource-constrained, for example, with lower processing capabilities compared to general purpose computing systems like desktops or servers. With the advent of paradigms such as internet-of-things (IoT), embedded systems in both commercial and industrial contexts are being increasingly interconnected and exposed to the external networ… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 59 publications
0
2
0
Order By: Relevance
“…Here, 0 signifies no protection, 3 is the highest level of protection, and 1 is the least. For this example, let us suppose that the security level (SL)-1 corresponds to TEECheck [18], and SL-2 corresponds to control-flow integrity (CFI) mechanisms [19]. Lastly, the highest level of security SL-3 can be the 256-bit encryption method.…”
Section: Proposed Real-time Task Modelmentioning
confidence: 99%
“…Here, 0 signifies no protection, 3 is the highest level of protection, and 1 is the least. For this example, let us suppose that the security level (SL)-1 corresponds to TEECheck [18], and SL-2 corresponds to control-flow integrity (CFI) mechanisms [19]. Lastly, the highest level of security SL-3 can be the 256-bit encryption method.…”
Section: Proposed Real-time Task Modelmentioning
confidence: 99%
“…Control Flow Integrity (CFI) [3] mechanisms play a crucial role in modern software security by safeguarding against control-flow hijacking attacks. These mechanisms rely on precise control flow data analysis to ensure the integrity of a program's execution path [4]. The extraction and analysis of control flow metadata facilitate the detection of anomalies, identification of control flow hijacking attempts, and development of effective countermeasures.…”
Section: Introductionmentioning
confidence: 99%