NSGA-II-Based Granularity-Adaptive Control-Flow Attestation
Since the widespread adoption of edge computing and IoT technology, Control-Flow Hijacking (CFH) attacks targeting programs in resource-constrained embedded devices have become prevalent. While the Coarse-Grained Control-Flow integrity Attestation (CGCFA) lacks accuracy for the CFH attacks detection...
Guardado en:
Autores principales: | Jing Zhan, Yongzhen Li, Yifan Liu, Hongchao Li, Shuai Zhang, Li Lin |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Hindawi-Wiley
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/f0174519b3df48fca02b08e55ff6d51d |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
Moving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network
por: Yifan Hu, et al.
Publicado: (2021) -
Intelligent Tea-Picking System Based on Active Computer Vision and Internet of Things
por: Jing Zhang, et al.
Publicado: (2021) -
A Lightweight Hierarchical Model with Frame-Level Joints Adaptive Graph Convolution for Skeleton-Based Action Recognition
por: Yujian Jiang, et al.
Publicado: (2021) -
Robust Zero Watermarking Algorithm for Medical Images Based on Zernike-DCT
por: Chengshan Yang, et al.
Publicado: (2021) -
Formation Satellite Reconstruction Strategy Based on NSGA-II Algorithm
por: SUN Hongqiang, et al.
Publicado: (2021)