An M-Cache-Based Security Monitoring and Fault Recovery Architecture for Embedded Processor

2020 ◽  
Vol 28 (11) ◽  
pp. 2314-2327
Author(s):  
Xiang Wang ◽  
Zongmin Zhao ◽  
Dongdong Xu ◽  
Zhun Zhang ◽  
Qiang Hao ◽  
...  
Electronics ◽  
2020 ◽  
Vol 9 (7) ◽  
pp. 1165
Author(s):  
Xiang Wang ◽  
Zongmin Zhao ◽  
Dongdong Xu ◽  
Zhun Zhang ◽  
Qiang Hao ◽  
...  

Nowadays, the secure program execution of embedded processor has attracted considerable research attention, since more and more code tampering attacks and transient faults are seriously affecting the security of embedded processors. The program monitoring and fault recovery strategies are not only closely related to the security of embedded devices, but also directly affect the performance of the processor. This paper presents a security monitoring and fault recovery architecture for run-time program execution, which takes regular backup copies of the two-stage checkpoint. In this framework, the integrity check technology based on the basic block (BB) is utilized to monitor the program execution in real-time, while the rollback operation is taken once the integrity check is failed. In addition, a Monitoring Cache (M-Cache) is built to buffer the reference data for integrity checking. Moreover, a recovery strategy mainly for three tampered positions (registers in processor, instructions in Cache, and codes in memory) is provided to ensure the smooth running of the embedded system. Finally, the open RISC processor is adopted to implement and verify the presented security architecture, which has been proved to be effective for program detection in the execution of tamper attack and quick recovery of the running environment as well as code.


2016 ◽  
Vol 22 (1) ◽  
pp. 1-29 ◽  
Author(s):  
Jinyong Lee ◽  
Ingoo Heo ◽  
Yongje Lee ◽  
Yunheung Paek

Author(s):  
Dimitris Gizopoulos ◽  
Antonis Paschalis ◽  
Yervant Zorian
Keyword(s):  

Risks ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 10
Author(s):  
Valentina Kravchenko ◽  
Tatiana Kudryavtseva ◽  
Yuriy Kuporov

The issue of economic security is becoming an increasingly urgent one. The purpose of this article is to develop a method for assessing threats to the economic security of the Russian region. This method is based on step-by-step actions: first of all, choosing an element of the region’s economic security system and collecting its descriptive indicators; then grouping indicators by admittance-process-result categories and building hypotheses about their influence; testing hypotheses using a statistical package and choosing the most significant connections, which can pose a threat to the economic security of the region; thereafter ranking regions by the level of threats and developing further recommendations. The importance of this method is that with the help of grouping regions (territory of a country) based on proposed method, it is possible to develop individual economic security monitoring tools. As a result, the efficiency of that country’s region can be higher. In this work, the proposed method was tested in the framework of public procurement in Russia. A total of 14 indicators of procurement activity were collected for each region of the Russian Federation for the period from 2014 to 2018. Regression models were built on the basis of the grouped indicators. Ordinary Least Squares (OLS) Estimation was used. As a result of pairwise regression models analysis, we have defined four significant relationships between public procurement indicators. There are positive connections between contracts that require collateral and the percentage of tolerances, between the number of bidders and the number of regular suppliers, between the number of bidders and the average price drop, and between the number of purchases made from a single supplier and the number of contracts concluded without reduction. It was determined that the greatest risks for the system were associated with the connection between competition and budget savings. It was proposed to rank analyzed regions into four groups: ineffective government procurement, effective government procurement, and government procurement that threatens the system of economic security of the region, that is, high competition with low savings and low competition with high savings. Based on these groups, individual economic security monitoring tools can be developed for each region.


Sign in / Sign up

Export Citation Format

Share Document