Two-Stage Checkpoint Based Security Monitoring and Fault Recovery Architecture for Embedded Processor

Nowadays, the secure program execution of embedded processor has attracted considerable research attention, since more and more code tampering attacks and transient faults are seriously affecting the security of embedded processors. The program monitoring and fault recovery strategies are not only c...

Full description

Bibliographic Details
Main Authors: Xiang Wang, Zongmin Zhao, Dongdong Xu, Zhun Zhang, Qiang Hao, Mengchen Liu, Yu Si
Format: Article
Language:English
Published: MDPI AG 2020-07-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/9/7/1165

Similar Items