An efficient control flow validation method using redundant computing capacity of dual-processor architecture.
Microprocessors in safety-critical system are extremely vulnerable to hacker attacks and circuit crosstalk, as they can modify binaries and lead programs to run along the wrong control flow paths. It is a significant challenge to design a run-time validation method with few hardware modification. In...
Main Authors: | Qingran Wang, Wei Guo, Jizeng Wei |
---|---|
Format: | Article |
Language: | English |
Published: |
Public Library of Science (PLoS)
2018-01-01
|
Series: | PLoS ONE |
Online Access: | http://europepmc.org/articles/PMC6070227?pdf=render |
Similar Items
-
Implementation of redundant CORDIC processor with efficient variable scale factor compensation
by: Huang, Zhuo-Xi, et al.
Published: (1995) -
Design and Implementation of Redundant On-line CORDIC Processor
by: Chen, Jian-Ying, et al.
Published: (1997) -
Performance Modeling of Single Processor and Multi-Processor Computer Architectures
by: Commissariat, Hormazd P.
Published: (2014) -
The group processor approach to computer architecture
by: Quick, G. E.
Published: (1982) -
Working Memory Capacity and Redundant Information Processing Efficiency
by: Michael John Endres, et al.
Published: (2015-05-01)