An efficient control flow validation method using redundant computing capacity of dual-processor architecture.

Microprocessors in safety-critical system are extremely vulnerable to hacker attacks and circuit crosstalk, as they can modify binaries and lead programs to run along the wrong control flow paths. It is a significant challenge to design a run-time validation method with few hardware modification. In...

Full description

Bibliographic Details
Main Authors: Qingran Wang, Wei Guo, Jizeng Wei
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2018-01-01
Series:PLoS ONE
Online Access:http://europepmc.org/articles/PMC6070227?pdf=render
id doaj-0af84cd800a74a6e82c33740e5e4b50b
record_format Article
spelling doaj-0af84cd800a74a6e82c33740e5e4b50b2020-11-25T02:12:27ZengPublic Library of Science (PLoS)PLoS ONE1932-62032018-01-01138e020112710.1371/journal.pone.0201127An efficient control flow validation method using redundant computing capacity of dual-processor architecture.Qingran WangWei GuoJizeng WeiMicroprocessors in safety-critical system are extremely vulnerable to hacker attacks and circuit crosstalk, as they can modify binaries and lead programs to run along the wrong control flow paths. It is a significant challenge to design a run-time validation method with few hardware modification. In this paper, an efficient control flow validation method named DCM (Dual-Processor Control Flow Validation Method) is proposed basing on dual-processor architecture. Since a burst of memory-access-intensive instructions could block pipeline and cause lots of waiting clocks, the DCM assigns the idle pipeline cycles of the blocked processor to the other processor to validate control flow at run time. An extra lightweight monitor unit in each processor is needed and a special dual-processor communication protocol is also designed to schedule the redundant computing capacity between two processors to do validation tasks better. To further improve the efficiency, we also design a software-based self-validation algorithm to help reduce validation times. The combination of both hardware method and software method can speed up the validation procedure and protect the control flow paths with different emphasis. The cycle-accurate simulator GEM5 is used to simulate two ARMv7-A processors with out-of-order pipeline. Experiment shows the performance overhead of DCM is less than 22% on average across the SPEC 2006 benchmarks.http://europepmc.org/articles/PMC6070227?pdf=render
collection DOAJ
language English
format Article
sources DOAJ
author Qingran Wang
Wei Guo
Jizeng Wei
spellingShingle Qingran Wang
Wei Guo
Jizeng Wei
An efficient control flow validation method using redundant computing capacity of dual-processor architecture.
PLoS ONE
author_facet Qingran Wang
Wei Guo
Jizeng Wei
author_sort Qingran Wang
title An efficient control flow validation method using redundant computing capacity of dual-processor architecture.
title_short An efficient control flow validation method using redundant computing capacity of dual-processor architecture.
title_full An efficient control flow validation method using redundant computing capacity of dual-processor architecture.
title_fullStr An efficient control flow validation method using redundant computing capacity of dual-processor architecture.
title_full_unstemmed An efficient control flow validation method using redundant computing capacity of dual-processor architecture.
title_sort efficient control flow validation method using redundant computing capacity of dual-processor architecture.
publisher Public Library of Science (PLoS)
series PLoS ONE
issn 1932-6203
publishDate 2018-01-01
description Microprocessors in safety-critical system are extremely vulnerable to hacker attacks and circuit crosstalk, as they can modify binaries and lead programs to run along the wrong control flow paths. It is a significant challenge to design a run-time validation method with few hardware modification. In this paper, an efficient control flow validation method named DCM (Dual-Processor Control Flow Validation Method) is proposed basing on dual-processor architecture. Since a burst of memory-access-intensive instructions could block pipeline and cause lots of waiting clocks, the DCM assigns the idle pipeline cycles of the blocked processor to the other processor to validate control flow at run time. An extra lightweight monitor unit in each processor is needed and a special dual-processor communication protocol is also designed to schedule the redundant computing capacity between two processors to do validation tasks better. To further improve the efficiency, we also design a software-based self-validation algorithm to help reduce validation times. The combination of both hardware method and software method can speed up the validation procedure and protect the control flow paths with different emphasis. The cycle-accurate simulator GEM5 is used to simulate two ARMv7-A processors with out-of-order pipeline. Experiment shows the performance overhead of DCM is less than 22% on average across the SPEC 2006 benchmarks.
url http://europepmc.org/articles/PMC6070227?pdf=render
work_keys_str_mv AT qingranwang anefficientcontrolflowvalidationmethodusingredundantcomputingcapacityofdualprocessorarchitecture
AT weiguo anefficientcontrolflowvalidationmethodusingredundantcomputingcapacityofdualprocessorarchitecture
AT jizengwei anefficientcontrolflowvalidationmethodusingredundantcomputingcapacityofdualprocessorarchitecture
AT qingranwang efficientcontrolflowvalidationmethodusingredundantcomputingcapacityofdualprocessorarchitecture
AT weiguo efficientcontrolflowvalidationmethodusingredundantcomputingcapacityofdualprocessorarchitecture
AT jizengwei efficientcontrolflowvalidationmethodusingredundantcomputingcapacityofdualprocessorarchitecture
_version_ 1724909218112208896