{"id":"https://openalex.org/W1987506715","doi":"https://doi.org/10.1109/isias.2010.5604197","title":"Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards","display_name":"Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W1987506715","doi":"https://doi.org/10.1109/isias.2010.5604197","mag":"1987506715"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2010.5604197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009610512","display_name":"Eugen Leontie","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Eugen Leontie","raw_affiliation_strings":["Computer Science Department, The George Washington University, Washington, DC, USA","Computer Science Department, The George Washington University, DC, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]},{"raw_affiliation_string":"Computer Science Department, The George Washington University, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111903186","display_name":"Olga Gelbart","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Olga Gelbart","raw_affiliation_strings":["Computer Science Department, The George Washington University, Washington, DC, USA","Computer Science Department, The George Washington University, DC, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]},{"raw_affiliation_string":"Computer Science Department, The George Washington University, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003176765","display_name":"Bhagirath Narahari","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bhagirath Narahari","raw_affiliation_strings":["Computer Science Department, The George Washington University, Washington, DC, USA","Computer Science Department, The George Washington University, DC, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]},{"raw_affiliation_string":"Computer Science Department, The George Washington University, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085312107","display_name":"Rahul Simha","orcid":"https://orcid.org/0000-0002-0689-9411"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rahul Simha","raw_affiliation_strings":["Computer Science Department, The George Washington University, Washington, DC, USA","Computer Science Department, The George Washington University, DC, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]},{"raw_affiliation_string":"Computer Science Department, The George Washington University, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5009610512"],"corresponding_institution_ids":["https://openalex.org/I193531525"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.07840827,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"125","last_page":"130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8365249633789062},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6508808135986328},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5962455868721008},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4244350790977478},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.4138340651988983},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4106272757053375},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3389362096786499},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2733921408653259}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8365249633789062},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6508808135986328},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5962455868721008},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4244350790977478},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.4138340651988983},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4106272757053375},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3389362096786499},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2733921408653259}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2010.5604197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1512062395","https://openalex.org/W1567046609","https://openalex.org/W1579850852","https://openalex.org/W1581096142","https://openalex.org/W1686420892","https://openalex.org/W1699782153","https://openalex.org/W1994135885","https://openalex.org/W2005725110","https://openalex.org/W2036601091","https://openalex.org/W2063058836","https://openalex.org/W2104225326","https://openalex.org/W2108255910","https://openalex.org/W2120562931","https://openalex.org/W2125491202","https://openalex.org/W2133707980","https://openalex.org/W2136021246","https://openalex.org/W2140972824","https://openalex.org/W2140979409","https://openalex.org/W2144765857","https://openalex.org/W2154909745","https://openalex.org/W2240862428","https://openalex.org/W4206314719","https://openalex.org/W4232751114","https://openalex.org/W4300807510","https://openalex.org/W6634652938","https://openalex.org/W6637406285","https://openalex.org/W6838336854"],"related_works":["https://openalex.org/W3096456556","https://openalex.org/W4240253816","https://openalex.org/W2169584677","https://openalex.org/W2979513934","https://openalex.org/W4232954277","https://openalex.org/W2020341030","https://openalex.org/W2749133591","https://openalex.org/W2367473450","https://openalex.org/W23346600","https://openalex.org/W2081416538"],"abstract_inverted_index":{"Embedded":[0],"systems":[1],"of":[2,15,80,101,154,167,193,200,222,264],"an":[3,47,81,91,141,155],"inherently":[4],"distributed":[5],"and":[6,21,28,34,43,63,94,116,149,220,260],"highly":[7],"replicated":[8],"nature":[9],"are":[10,36,71,122,179],"vulnerable":[11],"to":[12,60,97,112,133,160,181,245,255],"a":[13,99,107,191,197,206,241,246],"class":[14,100],"attacks":[16,70],"that":[17,196],"require":[18],"local":[19],"access":[20],"physical":[22,84],"tampering.":[23],"Processors":[24],"using":[25],"Encrypted":[26],"Execution":[27],"Data":[29],"(EED)":[30],"technology,":[31],"where":[32],"instructions":[33],"data":[35,118],"stored":[37],"in":[38,41,105,253],"encrypted":[39],"form":[40,46],"memory":[42,102],"locally":[44],"decrypted,":[45],"attractive":[48],"solution":[49],"for":[50,233],"securing":[51],"embedded":[52],"systems,":[53],"as":[54,120],"these":[55],"platforms":[56,76],"have":[57],"been":[58],"shown":[59],"protect":[61],"software":[62],"limit":[64],"information":[65],"leakage.":[66],"However,":[67],"numerous":[68],"realistic":[69],"still":[72],"possible":[73],"on":[74,190,216],"EED":[75],"given":[77],"the":[78,125,136,172,182,217,234,257,262],"assumption":[79],"adversary":[82],"with":[83,205],"access.":[85],"In":[86],"this":[87],"paper,":[88],"we":[89],"present":[90,240],"integrated":[92],"compiler":[93],"architectural":[95],"approach":[96],"address":[98],"spoofing":[103],"attacks,":[104],"which":[106,129],"sophisticated":[108],"attacker":[109,142],"is":[110,214,228],"able":[111],"control":[113],"off-chip":[114,186],"buses":[115],"modify":[117],"blocks":[119],"they":[121],"loaded":[123],"into":[124],"processor.":[126],"Our":[127,188],"approach,":[128],"utilizes":[130],"cache":[131,218],"boundaries":[132],"greatly":[134,170],"simplify":[135],"integrity":[137,223],"checking":[138,224],"process,":[139],"prevents":[140],"from":[143],"tampering,":[144],"injecting,":[145],"or":[146,185],"replaying":[147],"code":[148],"data.":[150],"We":[151,239],"make":[152],"use":[153,166],"on-chip":[156],"reconfigurable":[157,168],"logic":[158,169],"component":[159],"implement":[161],"our":[162,265],"security":[163,201],"mechanisms.":[164],"This":[165],"simplifies":[171],"required":[173,259],"hardware":[174],"modifications":[175],"-":[176],"no":[177],"changes":[178],"necessary":[180],"CPU,":[183],"cache,":[184],"memory.":[187],"simulations":[189],"number":[192],"benchmarks":[194],"show":[195],"high":[198],"level":[199],"can":[202],"be":[203],"achieved":[204],"low":[207],"performance":[208],"overhead.":[209],"The":[210],"average":[211],"overhead":[212],"incurred":[213],"dependent":[215],"size":[219],"type":[221],"scheme":[225],"used,":[226],"but":[227],"less":[229],"than":[230],"16%":[231],"even":[232],"most":[235],"computationally":[236],"intensive":[237],"scheme.":[238],"hardware/software":[242],"prototype":[243],"mapped":[244],"Field":[247],"Programmable":[248],"Gate":[249],"Array":[250],"(FPGA)":[251],"platform":[252],"order":[254],"evaluate":[256],"space":[258],"demonstrate":[261],"feasibility":[263],"approach.":[266]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
