CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Security Monitoring Approach in Embedded System

Published on None 2011 by K. Rahimunnisa, Dr. S.Sureshkumar, Rincy Merrin Varkey
International Conference on VLSI, Communication & Instrumentation
Foundation of Computer Science USA
ICVCI - Number 10
None 2011
Authors: K. Rahimunnisa, Dr. S.Sureshkumar, Rincy Merrin Varkey
d42d1609-fe57-4344-a063-e31069080635

K. Rahimunnisa, Dr. S.Sureshkumar, Rincy Merrin Varkey . Security Monitoring Approach in Embedded System. International Conference on VLSI, Communication & Instrumentation. ICVCI, 10 (None 2011), 26-29.

@article{
author = { K. Rahimunnisa, Dr. S.Sureshkumar, Rincy Merrin Varkey },
title = { Security Monitoring Approach in Embedded System },
journal = { International Conference on VLSI, Communication & Instrumentation },
issue_date = { None 2011 },
volume = { ICVCI },
number = { 10 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 26-29 },
numpages = 4,
url = { /proceedings/icvci/number10/2703-1419/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on VLSI, Communication & Instrumentation
%A K. Rahimunnisa
%A Dr. S.Sureshkumar
%A Rincy Merrin Varkey
%T Security Monitoring Approach in Embedded System
%J International Conference on VLSI, Communication & Instrumentation
%@ 0975-8887
%V ICVCI
%N 10
%P 26-29
%D 2011
%I International Journal of Computer Applications
Abstract

Embedded systems have been developed greatly in terms of scaling and integration of devices. With each new generation the complexity of the application also increases with its enhancement. But little concern is been given over the secure program execution. Thus the software program becomes susceptible to attacks. There has been a rising need for an efficient security system for embedded system applications. For the past years various monitoring techniques have been proposed to verify the execution. This paper proposes a model for verifying the execution of the program during run-time using encryption algorithm. Run-time verification combines monitoring with formal methods by checking specified behavior at run-time.

References
  1. S. Ravi, A. Raghunathan, and S. Chakradhar. 2004. Tamper Resistance Mechanisms for Secure, Embedded Systems. Proc. 17th Int’l conference Very Large Scale Integration Design (VLSI Design ’04). 605-611.
  2. M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. 2005 Control-Flow Integrity Principles, Implementations, and Applications. Proc. ACM conference. Computer and Comm. Security (CCS). 340-353.
  3. Divya Arora, Srivaths Ravi, Anand Raghunathan, and Niraj K. Jha. 2006. Hardware Assisted run-Time Monitoring for Secure program execution on embedded processors. IEEE Transaction Very Large Scale Integration Systems (VLSI).vol.14.no.12.1295-1307.
  4. G. Gogniat, T. Wolf, W. Burleson, J.-P. Diguet, L. Bossuet, and R. Vaslin. 2008. Reconfigurable Hardware for High-Security/High-Performance Embedded Systems: The SAFES Perspective. IEEE Trans. Very Large Scale Integration (VLSI) Systems. vol. 16. no. 2. 144-155.
  5. J. Zambreno, A. Choudhary, R. Simha, B. Narahari, and N. Memon. 2005. SAFEOPS: An Approach to Embedded Software Security. ACM Trans. Embedded Computing Systems. vol. 4. no. 1. 189-210.
  6. R.G. Ragel and S. Parameswaran.2006. IMPRES: Integrated Monitoring for Processor Reliability and Security. Proc. 43rd Ann. Conf. Design Automation(DAC). 502-505.
  7. Kurthatha Patel, Sri Paremeshwaran and Seng Lin Shee. 2007. Ensuring Secure program execution in multiprocessor embedded systems. Proceedings of the 5th IEEE/ACM international conference on Hardware/software co-design and system synthesis. 57-62.
  8. Z. Shao, Q. Zhuge, Y. He, and E.H.-M. Sha. 2003. Defending Embedded Systems Against Buffer Overflow via Hardware/Software. Proc. 19th Ann.Computer Security Applications Conf. (ACSAC). 352-363.
  9. Shufu Mao and Tilman Wolf. Hardware. 2010. Support for Secure Processing in Embedded Systems. IEEE transactions on Computers. vol. 59. no. 6. 847-854.
  10. William Stallings. 2007. Cryptography and Network Security. PHI Publishers. Second Edition.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Run-time monitoring Instruction integrity