Cargando…

An efficient control flow validation method using redundant computing capacity of dual-processor architecture

Microprocessors in safety-critical system are extremely vulnerable to hacker attacks and circuit crosstalk, as they can modify binaries and lead programs to run along the wrong control flow paths. It is a significant challenge to design a run-time validation method with few hardware modification. In...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Qingran, Guo, Wei, Wei, Jizeng
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6070227/
https://www.ncbi.nlm.nih.gov/pubmed/30067794
http://dx.doi.org/10.1371/journal.pone.0201127