Research Article
Blockchain-Assisted Distributed Fog Computing Control Flow Attestation
Table 7
Security comparison.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
√: the scheme supports features, ×: the scheme does not support features. SF1: Resist impersonation attacks, SF2: resist man-in-the-middle attacks, SF3: resist replay attacks, SF4: two-way authentication, SF5: known session key security, SF6: detect ROP attacks, SF7: detect JOP attacks, SF8: detect branch variable attacks, SF9: detect loop variable attacks, and SF10: detect function pointer attacks. |