Towards attacks on restricted memory areas through co-processors in embedded multi-OS environments via malicious firmware injection.
Pierre SchnarzJoachim WietzkeIngo StengelPublished in: CS2@HiPEAC (2014)
Keyphrases
- operating system
- malicious attacks
- malicious users
- memory management
- detect malicious
- watermarking algorithm
- embedded processors
- insider attacks
- malicious behavior
- anti virus
- processor core
- windows xp
- malicious code
- detecting malicious
- parallel processing
- memory subsystem
- power consumption
- attack detection
- open source
- computer systems
- parallel algorithm
- memory hierarchy
- watermarking technique
- insider threat
- malicious activities
- ibm zenterprise
- computing power
- watermarking scheme
- memory requirements
- data processing
- multithreading
- data corruption
- single chip
- main memory