Protecting IoT Devices through a Hardware-driven Memory Verification.
Troya Çagil KöylüHans OkkermanCezar Rodolfo Wedig ReinbrechtSaid HamdiouiMottaqiallah TaouilPublished in: DSD (2021)
Keyphrases
- computing power
- embedded devices
- embedded systems
- low end
- hardware designs
- parallel hardware
- internal memory
- low cost
- high end
- management system
- memory hierarchy
- personal computer
- processing capabilities
- hardware platforms
- memory usage
- memory management
- computational power
- hardware and software
- camera phones
- real time
- limited memory
- model checking
- mobile devices
- access control
- smart objects
- hardware implementation
- hardware architecture
- cloud computing
- desktop computers
- processing elements
- random access
- parallel computing
- big data
- memory requirements
- computer systems
- memory subsystem
- gigabit ethernet
- mobile handheld devices
- memory space
- computing systems
- data structure