Login / Signup
Simulation of a Secure CPU with SecureTag Technique to Defend Embedded Systems Against Buffer Overflow Attacks.
Michael Georg Grasser
Johannes Priebsch
Georg Hofer
Thomas Hodanek
Published in:
AICCSA (2007)
Keyphrases
</>
buffer overflow
embedded systems
hardware software
security problems
low cost
security mechanisms
data corruption
resource constrained
real time systems
security requirements
security issues
rare events
software systems
protocol stack
data security
lightweight
smart card
protection scheme
real time