2014 15th Latin American Test Workshop - LATW 2014
DOI: 10.1109/latw.2014.6841915
|View full text |Cite
|
Sign up to set email alerts
|

IDSM: An improved disjoint signature monitoring scheme for processor behavioral checking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…In some cases the approach is combined with software modifications, which support the watchdog processor operation. The Disjoint Signature Monitoring (DSM) approach [35,15] solves these problems by storing reference signatures in an auxiliary memory and using a watchdog processor to compare the reference signatures with the run time signatures. This approach does not require support from the software program.…”
Section: Previously Proposed Techniquesmentioning
confidence: 99%
See 3 more Smart Citations
“…In some cases the approach is combined with software modifications, which support the watchdog processor operation. The Disjoint Signature Monitoring (DSM) approach [35,15] solves these problems by storing reference signatures in an auxiliary memory and using a watchdog processor to compare the reference signatures with the run time signatures. This approach does not require support from the software program.…”
Section: Previously Proposed Techniquesmentioning
confidence: 99%
“…This approach does not require support from the software program. However, a drawback of the DSM approach is that the watchdog processor does not have access to the internal operation of the processor, which leads to a lower error coverage, particularly with complex processors [15].…”
Section: Previously Proposed Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…This last choice has been successfully applied to LEON3 microprocessor [11] and ARM A9 [12]. Other Hardware approaches use watchdog processors to observe the microprocessor behavior [13][14] High-end COTS microprocessors architecture can be explored to propose reliable solutions that meet the new requirements and provide high computational capability [15]. CNES (French National Centre for Space Studies, Centre National d'Études Spatiales) hardening architectures based in redundancy are a good example of it [16].…”
Section: Introductionmentioning
confidence: 99%