Malware Analysis Of API Calls Using FGPA Hardware Level Security Model

It is clear that something must be done to help the security community assess, test, and control the level of security of embedded systems. Infected targets consume more power than a cleaned target device because the malware performs additional computing tasks that require additional power to the target device’s processor.