The control flow checking technique presented in our paper is based on the new watchdog- processor method SEIS1 (Signature Encoded Instruction Stream). This method is in- tended to check the still uncovered area of state-of-the-art microprocessors using on-chip caches or instruction pipelines, since the processor instruction bus needs not be monitored. The control flow is checked using assigned actual signatures and embedded reference sig- natures. Since the actual and reference signatures are embedded in the checked program, the usual reference database and the time-consuming search/ compare engine in the watch- dog can be omitted. The evaluation of the actual signature is a ...
[EN] Control flow monitoring using a watchdog processor is a well-known technique to increase the de...
International audienceSoft errors with multiple erroneous bits have become a significant threat in e...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
The control flow checking technique presented in our paper is based on the new watchdog- proc...
ISBN: 0818621508An approach to concurrent control flow checking that avoids performance and software...
A new watchdog processor scheme for concurrent checking of program control flow is presented. This ...
ISBN: 081862051XControl flow checking techniques are discussed. Invariant properties of the control ...
ISBN: 0818628456Concurrent checking consists of permanently verifying the behavior of a system by ch...
The present paper explains a new approach to program control flow checking. The check has been inser...
A popular software attack on a program is by transferring the program control to malicious code inse...
Abstract: Many modern embedded systems use networks to communicate. This increases the attack surfa...
The improvement of dependability in computing systems requires the evaluation of fault tolerance mec...
Due to harsher working environments, soft errors or erroneous bit-flips occur more frequently in mic...
Abstract—This paper evaluates the concurrent error detection capabilities of system-level checks, us...
Microprocessors in safety-critical system are extremely vulnerable to hacker attacks and circuit cro...
[EN] Control flow monitoring using a watchdog processor is a well-known technique to increase the de...
International audienceSoft errors with multiple erroneous bits have become a significant threat in e...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
The control flow checking technique presented in our paper is based on the new watchdog- proc...
ISBN: 0818621508An approach to concurrent control flow checking that avoids performance and software...
A new watchdog processor scheme for concurrent checking of program control flow is presented. This ...
ISBN: 081862051XControl flow checking techniques are discussed. Invariant properties of the control ...
ISBN: 0818628456Concurrent checking consists of permanently verifying the behavior of a system by ch...
The present paper explains a new approach to program control flow checking. The check has been inser...
A popular software attack on a program is by transferring the program control to malicious code inse...
Abstract: Many modern embedded systems use networks to communicate. This increases the attack surfa...
The improvement of dependability in computing systems requires the evaluation of fault tolerance mec...
Due to harsher working environments, soft errors or erroneous bit-flips occur more frequently in mic...
Abstract—This paper evaluates the concurrent error detection capabilities of system-level checks, us...
Microprocessors in safety-critical system are extremely vulnerable to hacker attacks and circuit cro...
[EN] Control flow monitoring using a watchdog processor is a well-known technique to increase the de...
International audienceSoft errors with multiple erroneous bits have become a significant threat in e...
Since the widespread adoption of the internet, computer security has become one of the primary conce...