By Topic

Research on the Embedded Security Architecture Based on the Control Flow Security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Ou Qingyu ; Depart. of Inf. Security, Naval Univ. of Eng., Wuhan, China ; Huang Kai ; Wu Xiaoping

As an important parameter reflecting the system's behavior evidence, control flow has been the focus for attackers to carry out attacks on the security of a system. However, most of the security guards for control flow have been resting on the software level without considering the system architecture. Moreover, the current security guarding methods for control flow have much higher demands for the system's resources, and they are not suitable for the embedded application environment which has limited resources. To solve these problems, this paper introduces a security guarding architecture which combines the Cache with the random permutation. This security guarding architecture takes full advantage of the Cache's modulation function on the system's performance and the restraining function on the control flow information leakage. Combining with the random permutation algorithm, it provides with a high level security guard for the system control flow, and brings a better balance between the system security and the system efficiency.

Published in:

Computer Science and Engineering, 2009. WCSE '09. Second International Workshop on  (Volume:1 )

Date of Conference:

28-30 Oct. 2009