Abstract
Embedded applications are commonly used in different fields. Different kinds vulnerabilities can occur in embedded systems because of various reasons such as coding bugs or security attacks. Most of security vulnerabilities can occur during coding phase of an embedded application. During the design phase of a program, different types of coding bugs can be inserted to executable. On the other hand, even if the executable program is very well coded, many different kinds of vulnerabilities can also occur at runtime. In this thesis, we aim to provide a security application which controls integrity of running program in computer. Executable binary of a program consists of data and text sections. CPU fetches and executes instructions in the text section of a program. Each instruction block is firstly placed into instruction cache of CPU. Instruction block hashes are generated after compiler phase of a program. Then, during the runtime phase instruction block hashes are recalculated and compared with compiler phase hash. We aim to prevent running of a corrupted or manipulated program during runtime phase.
Original language | English |
---|---|
Title of host publication | 2022 5th International Conference on Theoretical and Applied Computer Science and Engineering, ICTASCE 2022 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 148-152 |
Number of pages | 5 |
ISBN (Electronic) | 9798350331622 |
DOIs | |
Publication status | Published - 2022 |
Event | 5th International Conference on Theoretical and Applied Computer Science and Engineering, ICTASCE 2022 - Istanbul, Turkey Duration: 29 Sept 2022 → 1 Oct 2022 |
Publication series
Name | 2022 5th International Conference on Theoretical and Applied Computer Science and Engineering, ICTASCE 2022 |
---|
Conference
Conference | 5th International Conference on Theoretical and Applied Computer Science and Engineering, ICTASCE 2022 |
---|---|
Country/Territory | Turkey |
City | Istanbul |
Period | 29/09/22 → 1/10/22 |
Bibliographical note
Publisher Copyright:© 2022 IEEE.
Keywords
- code integrity
- embedded security
- embedded systems