2002
DOI: 10.1109/24.994926
|View full text |Cite
|
Sign up to set email alerts
|

Control-flow checking by software signatures

Abstract: This paper presents a new signature monitoring technique, CFCSS (Control Flow Checking by Software Signatures); CFCSS is a pure software method that checks the control flow of a program using assigned signatures. An algorithm assigns a unique signature to each node in the program graph and adds instructions for error detection. Signatures are embedded in the program during compilation time using the constant field of the instructions and compared with run-time signatures when the program is executed. Another a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
273
0

Year Published

2002
2002
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 456 publications
(283 citation statements)
references
References 16 publications
1
273
0
Order By: Relevance
“…The first step in this approach consists on the application profiling (dynamic code analysis) to optimize the number of checkpoints introduced into the application code, which are inserted in the second step by means of the application of a well-known control flow technique such as CFCSS [28]. Unlike this controlflow protection technique, our metric is aimed at identifying the most critical registers from the microprocessor register file for a further application of data protection schemes (out of the scope of the present work).…”
Section: Related Workmentioning
confidence: 99%
“…The first step in this approach consists on the application profiling (dynamic code analysis) to optimize the number of checkpoints introduced into the application code, which are inserted in the second step by means of the application of a well-known control flow technique such as CFCSS [28]. Unlike this controlflow protection technique, our metric is aimed at identifying the most critical registers from the microprocessor register file for a further application of data protection schemes (out of the scope of the present work).…”
Section: Related Workmentioning
confidence: 99%
“…The so-called Software Implemented Hardware Fault Tolerance (SIHFT ) [25] techniques can be divided in two main categories according to the type of error they pretend to detect/correct: errors that may affect the control flow execution [26]; or errors that may affect the program data [27].…”
Section: Related Workmentioning
confidence: 99%
“…Some examples of these include ControlFlow Checking by Software Signatures (CFCSS ) [26], Assertions for Control Flow Checking (ACFC ) [28], Yet Another Control flow Checking Approach (YACCA) [29], and Control-flow Error Detection through Assertions (CEDA) [30]. Moreover, those approaches included in the second group are mainly based on the N-versions programming approach [31], which can be applied at different granularity levels: program [11,32], procedure [33], and the most commonly used, instruction level [27,[34][35][36].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Control-flow checking is another area of research that attempts to detect the effects of SDCs in applications [5]. Unfortunately control-flow integrity verification does not necessarily protect against SDCs that only alter data without affecting the execution path of an application.…”
Section: Related Workmentioning
confidence: 99%