Microprocessors in safety-critical system are extremely vulnerable to hacker attacks and circuit crosstalk, as they can modify binaries and lead programs to run along the wrong control flow paths. It is a significant challenge to design a run-time validation method with few hardware modification. In this paper, an efficient control flow validation method named DCM (Dual-Processor Control Flow Validation Method) is proposed basing on dual-processor architecture. Since a burst of memory-access-intensive instructions could block pipeline and cause lots of waiting clocks, the DCM assigns the idle pipeline cycles of the blocked processor to the other processor to validate control flow at run time. An extra lightweight monitor unit in each proces...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Concurrent programs are ubiquitous, from the high-end servers to personal machines, due to the fact ...
International audienceIn this paper we present a hardware based solution to verify simultaneously Co...
Processors' design complexity increases with transistors' growing density. At the same time, market ...
In this paper, a software behavior-based technique is presented to detect control-flow errors in mul...
ISBN: 0818621508An approach to concurrent control flow checking that avoids performance and software...
The control flow checking technique presented in our paper is based on the new watchdog- proc...
Modern, high performance microprocessors are extremely complex machines which require substantial va...
This work presents a new Dual-Core LockStep approach to enhance fault tolerance in microprocessors. ...
The improvement of dependability in computing systems requires the evaluation of fault tolerance mec...
Modern, high performance microprocessors are extremely complex machines which require substantial va...
ISBN: 0818628456Concurrent checking consists of permanently verifying the behavior of a system by ch...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...
A popular software attack on a program is by transferring the program control to malicious code inse...
ISBN: 081862051XControl flow checking techniques are discussed. Invariant properties of the control ...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Concurrent programs are ubiquitous, from the high-end servers to personal machines, due to the fact ...
International audienceIn this paper we present a hardware based solution to verify simultaneously Co...
Processors' design complexity increases with transistors' growing density. At the same time, market ...
In this paper, a software behavior-based technique is presented to detect control-flow errors in mul...
ISBN: 0818621508An approach to concurrent control flow checking that avoids performance and software...
The control flow checking technique presented in our paper is based on the new watchdog- proc...
Modern, high performance microprocessors are extremely complex machines which require substantial va...
This work presents a new Dual-Core LockStep approach to enhance fault tolerance in microprocessors. ...
The improvement of dependability in computing systems requires the evaluation of fault tolerance mec...
Modern, high performance microprocessors are extremely complex machines which require substantial va...
ISBN: 0818628456Concurrent checking consists of permanently verifying the behavior of a system by ch...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...
A popular software attack on a program is by transferring the program control to malicious code inse...
ISBN: 081862051XControl flow checking techniques are discussed. Invariant properties of the control ...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Concurrent programs are ubiquitous, from the high-end servers to personal machines, due to the fact ...
International audienceIn this paper we present a hardware based solution to verify simultaneously Co...