SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems.
Xi TanZiming ZhaoPublished in: CCS (2023)
Keyphrases
- embedded systems
- control flow
- data flow
- low cost
- computing power
- resource limited
- embedded devices
- software systems
- process model
- embedded software
- real time systems
- embedded real time systems
- software testing
- hardware software
- hw sw
- consumer electronics
- databases
- protocol stack
- security protocols
- flash memory
- modeling language
- real time