Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems.
Shijia WeiAydin AysuMichael OrshanskyAndreas GerstlauerMohit TiwariPublished in: HOST (2019)
Keyphrases
- embedded systems
- low cost
- computing power
- embedded software
- embedded devices
- resource limited
- network attacks
- software systems
- real time systems
- hardware software
- power consumption
- hw sw
- processing power
- anomaly detection
- intrusion detection
- flash memory
- software architecture
- real time image processing
- normal behavior
- protocol stack
- high level
- safety critical
- field programmable gate array
- security mechanisms
- computational power
- design process