System Security in Embedded Systems based on Hardware Support

Authors

  • Adyanata Lubis Author
  • B. Herawan Hayadi Author

Abstract

The natural impediments of implanted frameworks make them especially defenseless against assaults. We have built up an equipment screen that works in corresponding to the implanted processor and distinguishes any assault that makes the inserted processor veer off from its initially modified conduct. We investigate a few unique attributes that can be utilized for checking and quantitative tradeoffs between these methodologies. Our outcomes provide that the new projected hash-based observing example can identify assaults inside one guidance series at lesser memory necessities than customary methodologies that utilization control-stream data.

Downloads

Published

19-04-2025

Issue

Section

Articles

How to Cite

System Security in Embedded Systems based on Hardware Support. (2025). International Journal of Computing and Mathematics, 1(4). http://ijcm.melangepublications.com/index.php/home/article/view/43