NSGA-II-Based Granularity-Adaptive Control-Flow Attestation

Since the widespread adoption of edge computing and IoT technology, Control-Flow Hijacking (CFH) attacks targeting programs in resource-constrained embedded devices have become prevalent. While the Coarse-Grained Control-Flow integrity Attestation (CGCFA) lacks accuracy for the CFH attacks detection...

Full description

Saved in:
Bibliographic Details
Main Authors: Jing Zhan, Yongzhen Li, Yifan Liu, Hongchao Li, Shuai Zhang, Li Lin
Format: article
Language:EN
Published: Hindawi-Wiley 2021
Subjects:
Online Access:https://doaj.org/article/f0174519b3df48fca02b08e55ff6d51d
Tags: Add Tag
No Tags, Be the first to tag this record!