Control Flow Checking and Recovering based on 8051 Architecture

被引:0
|
作者
Gong Rui [1 ]
Chen Wei [1 ]
Liu Fang [1 ]
Dai Kui [1 ]
Wang Zhiying [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China
关键词
Control Flow Checking; Recovering; 8051; Architecture;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Control flow checking is a commonly used method to promote the fault tolerance of embedded systems. Conventional control flow checking by software signatures (CFCSS) imposes large overheads on code size and performance. A control flow checking scheme based on 8051 architecture, the control flow checking and recovering by compiler signatures and hardware checking (CFCCH) is proposed in this paper. Compared to CFCSS, the CFCCH is preferred to be implemented on the 8051 architectures to efficiently reduce code size and program execution time while keep the same fault tolerant ability.
引用
收藏
页码:1550 / 1551
页数:2
相关论文
共 50 条
  • [31] Design of a portable control-flow checking technique
    Alkhalifa, Z
    Nair, VSS
    1997 HIGH-ASSURANCE ENGINEERING WORKSHOP - PROCEEDINGS, 1997, : 120 - 123
  • [32] Interactive Hybrid Control-flow Checking Method
    Duricek, Maros
    Krajcovic, Tibor
    2014 INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS (AE), 2014, : 79 - 82
  • [33] Towards Recovering the Software Architecture of Microservice-based Systems
    Granchelli, Giona
    Cardarelli, Mario
    Di Francesco, Paolo
    Malavolta, Ivano
    Iovino, Ludovico
    Di Salle, Amleto
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE WORKSHOPS (ICSAW), 2017, : 46 - 53
  • [34] Symbolic model checking of deadlock free property of task control architecture
    Hiraishi, H
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2002, E85D (10) : 1579 - 1586
  • [35] Equivalence Checking for Flow-Based Computing
    Thijssen, Sven
    Jha, Sumit Kumar
    Ewetz, Rickard
    2022 IEEE 40TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2022), 2022, : 656 - 663
  • [36] A scheme for protecting mobile agents based on combining obfuscated control flow and time checking technology
    Wu, Jiehong
    Zhang, Yujie
    Wang, Xiaowei
    Chang, Guiran
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 912 - +
  • [37] A Performance Counter-based Control Flow Checking Technique for Multi-core Processors
    Ahmad, Hussien Al-haj
    Sedaghat, Yasser
    Rezaei, Mohammadreza
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2017, : 461 - 466
  • [38] Recovering Software Architecture with Softwarenaut
    Lungu, Mircea
    Nierstrasz, Oscar
    ERCIM NEWS, 2012, (88): : 14 - 15
  • [39] Outline of a Thick Control Flow Architecture
    Forsell, Martti
    Roivainen, Jussi
    Leppanen, Ville
    2016 28TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND HIGH PERFORMANCE COMPUTING WORKSHOPS (SBAC-PADW), 2016, : 1 - 6
  • [40] Information flow in a control and monitoring architecture
    Chaillet-Subias, A
    Combacau, EZM
    ISIE '97 - PROCEEDINGS OF THE IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, VOLS 1-3, 1997, : 53 - 58