Intrinsic code attestation by instruction chaining for embedded devices
In this paper we present a novel approach to ensure that no malicious code can be executed
on resource constraint devices such as sensor nodes or embedded devices. The core idea
is to encrypt the code and to decrypt it after reading it from the memory. Thus, if the code is
not encrypted with the correct key it cannot be executed due the incorrect result of the
decryption operation. A side effect of this is that the code is protected from being copied. In
addition we propose to bind instructions to their predecessors by cryptographic approaches …
on resource constraint devices such as sensor nodes or embedded devices. The core idea
is to encrypt the code and to decrypt it after reading it from the memory. Thus, if the code is
not encrypted with the correct key it cannot be executed due the incorrect result of the
decryption operation. A side effect of this is that the code is protected from being copied. In
addition we propose to bind instructions to their predecessors by cryptographic approaches …
Intrinsic code attestation by instruction chaining for embedded devices
G Leander - Security and Privacy in Communication Networks …, 2016 - books.google.com
In this paper we present a novel approach to ensure that no malicious code can be executed
on resource constraint devices such as sensor nodes or embedded devices. The core idea
is to encrypt the code and to decrypt it after reading it from the memory. Thus, if the code is
not encrypted with the correct key it cannot be executed due the incorrect result of the
decryption operation. A side effect of this is that the code is protected from being copied. In
addition we propose to bind instructions to their predecessors by cryptographic approaches …
on resource constraint devices such as sensor nodes or embedded devices. The core idea
is to encrypt the code and to decrypt it after reading it from the memory. Thus, if the code is
not encrypted with the correct key it cannot be executed due the incorrect result of the
decryption operation. A side effect of this is that the code is protected from being copied. In
addition we propose to bind instructions to their predecessors by cryptographic approaches …
Showing the best results for this search. See all results