2014 International Conference on Applied Electronics 2014
DOI: 10.1109/ae.2014.7011673
|View full text |Cite
|
Sign up to set email alerts
|

Interactive hybrid Control-flow checking method

Abstract: Embedded systems are often used for special purposes. When an embedded system is operating in a critical environment, its reliability should be focused on. One of the methods for improving reliability of embedded systems is Control-flow checking (CFC) of the running program. It is known that the control-flow errors comprise between 33% and 77% of all errors in a computer system [1]. Nowadays there are many controlflow checking methods for different types of computer systems and with various designs. There are … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…ASIS [11] uses a hardware signature generator and watchdog monitor to check the control flow of several processors. (3) Hybrid CFC techniques [4,10,12,[34][35][36]42], in general, involve modifications of program code using a compiler, and modifications in the processor hardware, to monitor the control flow. They apply a mix of software and hardware techniques to detect CFEs.…”
Section: Control Flow Errors and Control Flow Checkingmentioning
confidence: 99%
See 1 more Smart Citation
“…ASIS [11] uses a hardware signature generator and watchdog monitor to check the control flow of several processors. (3) Hybrid CFC techniques [4,10,12,[34][35][36]42], in general, involve modifications of program code using a compiler, and modifications in the processor hardware, to monitor the control flow. They apply a mix of software and hardware techniques to detect CFEs.…”
Section: Control Flow Errors and Control Flow Checkingmentioning
confidence: 99%
“…For example, as shown in Figure 1, CFCSS adds some instructions to assign a variable to a unique value (signature) in each basic block, and also adds instructions in each basic block to check if the control flow is coming from a correct predecessor basic block. Several control flow based soft error protection techniques were developed over the last few decades and span across design layers from hardware [11, 23-25, 31, 32], software [2,3,9,15,28,39,40], and hardware-software hybrid techniques [4,10,12,[34][35][36]42].…”
Section: Introductionmentioning
confidence: 99%