“…At the meantime, the security of the IoT has attracted the attention of research. As the embedded core of IoT, it is vulnerable to hardware Trojan [1] , [2] , [3] , [4] , [5] , [6] , [7] , [8] , [9] , [10] , [11] , [12] , [13] and code tamper attacks [14] , [15] , [16] , which could have serious consequences, including functional changes, denial of service (DoS), information leakage, and even system crashes. Thus, the security issue of embedded processor becomes extremely prominent, the recovery mechanism after attack detection is an important scheme to guarantee the security of embedded processor.…”