2014
DOI: 10.1109/tii.2013.2248373
|View full text |Cite
|
Sign up to set email alerts
|

Software-Based Control Flow Checking Against Transient Faults in Industrial Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(32 citation statements)
references
References 30 publications
0
32
0
Order By: Relevance
“…If V(s, d n ) does not meet zero, the CFE monitor judges that CFE has occurred. As the simplest case of a signature-based CFE monitoring scheme, U(b n , s) = b n and Most of the existing signature-based CFE monitoring schemes, such as CFCSS [16], YACCA [17], ECCA [18], RSCFC [15], SEDSR [14], SCFC [13], and RASM [12] have mainly focused on how to update and verify software signatures. They have tried to more appropriately select the number of run-time signatures and compile-time signatures, where to insert the signature update and signature verification in each basic block, and the algorithms of signature update and signature verification to improve performance through low execution overhead time and high CFE detection rate.…”
Section: Signature-based Cfe Monitoring Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…If V(s, d n ) does not meet zero, the CFE monitor judges that CFE has occurred. As the simplest case of a signature-based CFE monitoring scheme, U(b n , s) = b n and Most of the existing signature-based CFE monitoring schemes, such as CFCSS [16], YACCA [17], ECCA [18], RSCFC [15], SEDSR [14], SCFC [13], and RASM [12] have mainly focused on how to update and verify software signatures. They have tried to more appropriately select the number of run-time signatures and compile-time signatures, where to insert the signature update and signature verification in each basic block, and the algorithms of signature update and signature verification to improve performance through low execution overhead time and high CFE detection rate.…”
Section: Signature-based Cfe Monitoring Schemesmentioning
confidence: 99%
“…CFE-a illustrates a CFE caused by a jump to an illegal basic block and CFE-b illustrates a jump to the current basic block. Many previous signature-based CFE monitoring schemes [12][13][14][15][16][17][18] detects CFE for jump to an illegal basic block, but some schemes have not detected CFE for jump to a current basic block [13,14]. Figure 3b shows the inter-procedural CFE where the CFE occurs beyond the function boundary.…”
Section: Coverage Of Cfe Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The constraint for (D B (i) − D A (i + 1)) can be obtained similarly as for (4). As the introduced jitter has an upper bound of J e2e and a lower bound of 0, both (J A (i) − J B (i + 1)) and (J B (i) − J A (i + 1)) are upper bounded by J e2e .…”
Section: Condition For Avoiding Frame Sequence Inversionmentioning
confidence: 99%
“…R ELIABILITY is one of the main concerns for safety critical systems (See, e.g., [1]- [4]). A typical example of such systems is avionics communication network for which failures may be catastrophic.…”
Section: Introductionmentioning
confidence: 99%