Anatomy of Memory Corruption Attacks and Mitigations in Embedded Systems.
Nektarios Georgios TsoutsosMichail ManiatakosPublished in: IEEE Embed. Syst. Lett. (2018)
Keyphrases
- embedded systems
- computing power
- data corruption
- flash memory
- low cost
- processing power
- embedded devices
- resource limited
- hardware software
- embedded software
- hw sw
- real time image processing
- real time systems
- software systems
- consumer electronics
- computational power
- multi agent systems
- safety critical
- memory space
- communication technologies
- memory requirements
- real time
- security mechanisms
- data model
- embedded real time systems