An efficient control flow validation method using redundant computing capacity of dual-processor architecture.

Microprocessors in safety-critical system are extremely vulnerable to hacker attacks and circuit crosstalk, as they can modify binaries and lead programs to run along the wrong control flow paths. It is a significant challenge to design a run-time validation method with few hardware modification. In...

Full description

Bibliographic Details
Main Authors: Qingran Wang, Wei Guo, Jizeng Wei
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2018-01-01
Series:PLoS ONE
Online Access:http://europepmc.org/articles/PMC6070227?pdf=render