Cargando…
An efficient control flow validation method using redundant computing capacity of dual-processor architecture
Microprocessors in safety-critical system are extremely vulnerable to hacker attacks and circuit crosstalk, as they can modify binaries and lead programs to run along the wrong control flow paths. It is a significant challenge to design a run-time validation method with few hardware modification. In...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6070227/ https://www.ncbi.nlm.nih.gov/pubmed/30067794 http://dx.doi.org/10.1371/journal.pone.0201127 |