Software-based methods for the detection of control-flow errors caused by transient fault usually consist in the introduction of protecting instructions both at the beginning and at the end of basic blocks. These methods are conservative in nature, in the sense that they assume that all blocks have the same probability of being the target of control flow errors. Because of that assumption they can lead to a considerable increase both in memory and performance overhead during execution time. In this paper, we propose a static analysis that provide a more refined information about which basic blocks can be the target of control-flow-errors caused by single-bit flips. This information can then be used to guide a program transformation in which...
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attacke...
Many software-implemented control flow error detection techniques have been proposed over the years....
Software assurance is of paramount importance given the increasing impact of software on our lives. ...
Recent increase of transient fault rates has made processor reliability a major concern. Moreover pe...
Increasing design complexity for current and future generations of microelectronic technologies lead...
A popular software attack on a program is by transferring the program control to malicious code inse...
Transient faults can affect the behavior of electronic systems, and represent a major issue in many ...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
<p>Embedded software today is pervasive: they can be found everywhere, from coffee makers and medica...
Abstract—This paper evaluates the concurrent error detection capabilities of system-level checks, us...
Analyzing the executions of a buggy program is essentially a data mining process: Tracing the data g...
In modern safety-critical embedded systems reliability and performance are two important criteria. I...
A common requirement of embedded software in charge of safety tasks is to guarantee the identificati...
Today, embedded systems are being used in many (safety-critical) applications. However, due to their...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attacke...
Many software-implemented control flow error detection techniques have been proposed over the years....
Software assurance is of paramount importance given the increasing impact of software on our lives. ...
Recent increase of transient fault rates has made processor reliability a major concern. Moreover pe...
Increasing design complexity for current and future generations of microelectronic technologies lead...
A popular software attack on a program is by transferring the program control to malicious code inse...
Transient faults can affect the behavior of electronic systems, and represent a major issue in many ...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
<p>Embedded software today is pervasive: they can be found everywhere, from coffee makers and medica...
Abstract—This paper evaluates the concurrent error detection capabilities of system-level checks, us...
Analyzing the executions of a buggy program is essentially a data mining process: Tracing the data g...
In modern safety-critical embedded systems reliability and performance are two important criteria. I...
A common requirement of embedded software in charge of safety tasks is to guarantee the identificati...
Today, embedded systems are being used in many (safety-critical) applications. However, due to their...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attacke...
Many software-implemented control flow error detection techniques have been proposed over the years....
Software assurance is of paramount importance given the increasing impact of software on our lives. ...