Software monitoring and debugging can be efficiently supported by one of the concurrent error detection methods, the application of watchdog processors. A watchdog processor, as a co-processor, receives and evaluates signatures assigned to the states of the program execution. After the checking, it stores the run-time sequence of signatures which identify the statements of the program. In this way, a trace of the statements executed before the error is available. The signature buffer can be efficiently utilized if the signature sequence is compressed. In the paper, two real-time compression methods are presented and compared. The first one uses predefined dictionaries, while the other one utilizes the structural information encoded in th...
Reliability issues such as a soft error and NBTI (negative bias temperature instability) have become...
The present paper explains a new approach to program control flow checking. The check has been inser...
Software-based fault tolerance techniques are a low-cost way to protect processors against soft erro...
Software monitoring and debugging can be efficiently supported by one of the concurrent error detect...
The control flow checking technique presented in our paper is based on the new watchdog- proc...
Fingerprinting summarizes the history of internal processor state updates into a cryptographic signa...
[EN] Control flow monitoring using a watchdog processor is a well-known technique to increase the de...
This thesis addresses three important steps in the selection of error detection mechanisms for micro...
Abstract-A linear feedback shift register can be used to compress a serial stream of test result dat...
Several software maintenance tasks such as debugging, phase-identification, or simply the high-level...
The improvement of dependability in computing systems requires the evaluation of fault tolerance mec...
A significant number of logs are generated in dynamic malware analysis. Consequently, a method for e...
A test system is considered in which the signature analyzer, i.e. the most frequently applied system...
In this paper, we describe a program monitor which is able to capture runtime instruction sequences ...
Memory forensics is a fundamental step in any security incident response process, especially in comp...
Reliability issues such as a soft error and NBTI (negative bias temperature instability) have become...
The present paper explains a new approach to program control flow checking. The check has been inser...
Software-based fault tolerance techniques are a low-cost way to protect processors against soft erro...
Software monitoring and debugging can be efficiently supported by one of the concurrent error detect...
The control flow checking technique presented in our paper is based on the new watchdog- proc...
Fingerprinting summarizes the history of internal processor state updates into a cryptographic signa...
[EN] Control flow monitoring using a watchdog processor is a well-known technique to increase the de...
This thesis addresses three important steps in the selection of error detection mechanisms for micro...
Abstract-A linear feedback shift register can be used to compress a serial stream of test result dat...
Several software maintenance tasks such as debugging, phase-identification, or simply the high-level...
The improvement of dependability in computing systems requires the evaluation of fault tolerance mec...
A significant number of logs are generated in dynamic malware analysis. Consequently, a method for e...
A test system is considered in which the signature analyzer, i.e. the most frequently applied system...
In this paper, we describe a program monitor which is able to capture runtime instruction sequences ...
Memory forensics is a fundamental step in any security incident response process, especially in comp...
Reliability issues such as a soft error and NBTI (negative bias temperature instability) have become...
The present paper explains a new approach to program control flow checking. The check has been inser...
Software-based fault tolerance techniques are a low-cost way to protect processors against soft erro...