毕业论文论文范文课程设计实践报告法律论文英语论文教学论文医学论文农学论文艺术论文行政论文管理论文计算机安全
您现在的位置: 毕业论文 >> 英语论文 >> 正文

COMPILER/HARDWARE ASSISTED APPLICATION CODE AND DATA SECURITY IN EMBEDDED SYSTEMS

更新时间:2014-11-18:  来源:毕业论文
execution stream with the monitoring model. The
hardware has three functions: control flow validation,
code integrity validation and static/dynamic data
integrity validation. Once the attacks occur, a control
signal will be sent to the processor to trigger the
response mechanism (e.g., terminating or recovering
the program). The monitoring hardware is
implemented on-chip, so it can not be compromised
by many malicious software and physical attacks.
Figure 3. The CHCDP Design Flow
The Compiler Design  镜胆囊切除术病人的护理
The compiler plays an crucial role in the offline
security analysis. It generates the monitoring model
automatically. A good monitoring model needs to
have the capacities as follows: a)Easily extract
through automatic program analysis. b) Accurately
describe the program intended behavior. c) Promptly
detect the unintended behavior. d) Necessarily meet
lightweight demand for resource-limited embedded
system.  本文来自辣.文,论-文·网
Considering the above requirements, the basic
block level is chosen to monitor the application code
execution and the cache block level is chosen to
monitor the application data. We define the end of a
basic block is a branch or jump instruction, and the
next instruction is the beginning of another basic
block. The designed model contains four sets: F, B,
C&D.

上一页  [1] [2] [3] [4] [5] [6] 

COMPILER/HARDWARE ASSISTED APPLICATION CODE AND DATA SECURITY IN EMBEDDED SYSTEMS 第6页下载如图片无法显示或论文不完整,请联系qq752018766
设为首页 | 联系站长 | 友情链接 | 网站地图 |

copyright©751com.cn 辣文论文网 严禁转载
如果本毕业论文网损害了您的利益或者侵犯了您的权利,请及时联系,我们一定会及时改正。