Stream cipher hash based execution monitoring (SCHEM) framework for intrusion detection on embedded processors


Hardware based execution monitoring of applications holds the promise for an effective and tamper-proof solution for intrusion detection on processor. This paper presents a practical hardware based intrusion detection framework which uses stream cipher based hashing techniques for runtime control flow and instruction integrity monitoring. This framework… (More)
DOI: 10.1109/IOLTS.2012.6313864


7 Figures and Tables

Slides referencing similar topics