execution stream with the monitoring model. The
hardware has three functions: control flow validation,
code integrity validation and static/dynamic data
integrity validation. Once the attacks occur, a control
signal will be sent to the processor to trigger the
response mechanism (e.g., terminating or recovering
the program). The monitoring hardware is
implemented on-chip, so it can not be compromised
by many malicious software and physical attacks.
Figure 3. The CHCDP Design Flow
The Compiler Design
镜胆囊切除术病人的护理The compiler plays an crucial role in the offline
security analysis. It generates the monitoring model
automatically. A good monitoring model needs to
have the capacities as follows: a)Easily extract
through automatic program analysis. b) Accurately
describe the program intended behavior. c) Promptly
detect the unintended behavior. d) Necessarily meet
lightweight demand for resource-limited embedded
system. 本文来自优.文,论-文·网
Considering the above requirements, the basic
block level is chosen to monitor the application code
execution and the cache block level is chosen to
monitor the application data. We define the end of a
basic block is a branch or jump instruction, and the
next instruction is the beginning of another basic
block. The designed model contains four sets: F, B,
C&D.
上一页 [1] [2] [3] [4] [5] [6]
COMPILER/HARDWARE ASSISTED APPLICATION CODE AND DATA SECURITY IN EMBEDDED SYSTEMS 第6页下载如图片无法显示或论文不完整,请联系qq752018766