IN-BUILT INTRUSION DETECTION SYSTEM FOR EMBEDDED PROCESSORS

被引:0
|
作者
Rahimunnisa, K. [1 ]
Varkey, Rincy Merrin [1 ]
Sureshkumar, S. [2 ]
机构
[1] Karunya Univ, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[2] Karunya Univ, Dept Elect & Elect Engn, Coimbatore, Tamil Nadu, India
来源
2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011) | 2011年
关键词
Code injection; Encryption; Embedded system; Instruction integrity; Intrusion detection; Monitoring; HARDWARE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With each new generation of embedded system the complexity of the application also increases with its enhancement. But little concern is been given over the secure program execution. Thus the software program becomes susceptible to attacks. There has been a rising need for an efficient security system for embedded system applications. For the past years various monitoring techniques have been proposed to verify the execution. This paper proposes a model for verifying the execution of the program during run-time within a single instruction cycle.
引用
收藏
页码:524 / +
页数:2
相关论文
共 50 条
  • [1] AN IN-BUILT 'PROBLEM'
    BAINS, RS
    NEW STATESMAN & SOCIETY, 1992, 5 (230): : 28 - 28
  • [2] IN-BUILT FAILURE ENVIRONMENTS
    JOWETT, CE
    MICROELECTRONICS AND RELIABILITY, 1976, 15 (01): : 57 - 60
  • [3] Platform based on an embedded system to evaluate the intrusion detection system
    Saber, Mohammed
    Emharref, Mohamed
    Bouchentouf, Toumi
    Benazzi, Abdelhamid
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 894 - 899
  • [4] In-built safety for submarines
    Pugh, Michael
    PROFESSIONAL ENGINEERING, 2008, 21 (10) : 17 - 17
  • [5] NET: in-built conflict
    Biyani, A. K.
    CURRENT SCIENCE, 2011, 101 (12): : 1520 - 1520
  • [6] Network Intrusion Detection System Embedded on a Smart Sensor
    Macia-Perez, Francisco
    Mora-Gimeno, Francisco J.
    Marcos-Jorquera, Diego
    Antonio Gil-Martinez-Abarca, Juan
    Ramos-Morillo, Hector
    Lorenzo-Fonseca, Iren
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2011, 58 (03) : 722 - 732
  • [7] An Embedded Intrusion Detection System Model for Application Program
    Wu, Shaofei
    Chen, Yan
    PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1861 - +
  • [8] Stream Cipher Hash based Execution Monitoring (SCHEM) Framework for Intrusion Detection on Embedded Processors
    Chaudhari, Ameya
    Abraham, Jacob
    2012 IEEE 18TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2012, : 162 - 167
  • [9] Design and implementation of an embedded intrusion detection system for wireless applications
    Ali, Q. I.
    Iazim, S.
    IET INFORMATION SECURITY, 2012, 6 (03) : 171 - 182
  • [10] Embedded Vision based Automotive Interior Intrusion Detection System
    Cai, Haibin
    Lee, Donghee
    Hwang, Joonkoo
    Fang, Yinfeng
    Li, Song
    Liu, Honghai
    2017 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2017, : 2909 - 2914