Efficient protection against data errors in embedded control software
نویسندگان
چکیده
This paper presents a novel approach to tolerating transient data faults that may affect the software executing on commercial-of-the-shelf (COTS) embedded processors. The main concept of the approach is the use of information redundancy, in which the program user data and user stack areas are duplicated byte-forbyte in areas of RAM known as mirror arrays. We also present a novel approach to implementing the management of this data duplication and fault detection/correction in software which results in highly readable, portable code. Preliminary results are reported for a matrix multiplication program which indicates the effectiveness of the technique. Key-Words: Software Fault Tolerance, Embedded Systems.
منابع مشابه
Proposing an Efficient Software-Based Method for Enhancing the Reliability of Critical Application Robot
Robots play such remarkable roles in humans’ modern lives that performing many tasks without them isimpossible. Using robotic systems is gradually increasing the tasks allocated to them and they are becomingmore complex and critical. Software reliability is one of the most significant requirements of robots. Forenhancing reliability, systems should be inherently designed to be tolerable of soft...
متن کاملProposing an Efficient Software-based Method to Enhance Reliability of Computer Systems against Soft Errors
In recent years, along with rapid developments in technology, computer systems haveincreasingly become more integrated and more modular. Indeed, the reliability and efficiency ofcomputer systems are of high significance. Hence, the quantitative evaluation of the optimizationof reliability indexes in computer systems is considered to be a crucial issue. Reliabilityenhancement of computer systems...
متن کاملEmbedded Software Security through Key-Based Control Flow Obfuscation
Protection against software piracy and malicious modification of software is proving to be a great challenge for resource-constrained embedded systems. In this paper, we develop a non-cryptographic, keybased, control flow obfuscation technique, which can be implemented by computationally efficient means, and is capable of operating with minimal hardware support. The scheme is based on matching ...
متن کاملEfficient implementation of fault-tolerant data structures in embedded control software
This paper presents a methodology and small software library which is intended to reduce the impact of transient data errors that may affect the software executing on commercial-of-the-shelf (COTS) embedded processors. The methodology involves duplication of data in disparate areas of memory (referred to as “mirror arrays”), and the complexity of the processing required to manage these areas is...
متن کاملPUF-Based Software Protection for Low-End Embedded Devices
In recent years, low-end embedded devices have been used increasingly in various scenarios, ranging from consumer electronics to industrial equipment. However, this evolution made embedded devices profitable targets for software piracy and software manipulation. Aggravating this situation, low-end embedded devices typically lack secure hardware to effectively protect against such attacks. In th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007