Two-Stage Checkpoint Based Security Monitoring and Fault Recovery Architecture for Embedded Processor
Nowadays, the secure program execution of embedded processor has attracted considerable research attention, since more and more code tampering attacks and transient faults are seriously affecting the security of embedded processors. The program monitoring and fault recovery strategies are not only c...
Main Authors: | Xiang Wang, Zongmin Zhao, Dongdong Xu, Zhun Zhang, Qiang Hao, Mengchen Liu, Yu Si |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-07-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/9/7/1165 |
Similar Items
-
Metamori: A library for Incremental File Checkpointing
by: Jeyakumar, Ashwin Raju
Published: (2011) -
Recovery from the DNA Replication Checkpoint
by: Indrajit Chaudhury, et al.
Published: (2016-10-01) -
Fault-Tolerant Average Execution Time Optimization for General-Purpose Multi-Processor System-On-Chips
by: Väyrynen, Mikael
Published: (2009) -
ON-DEMAND CHECKPOINT AND RECOVERY SCHEME FOR WIRELESS SENSOR NETWORKS
by: N. Nithilan, et al.
Published: (2015-02-01) -
Fault Tolerant Distributed Stream Processing based on Backtracking
by: Qiming Chen, et al.
Published: (2013-11-01)