• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Gong Rui, Chen Wei, Liu Fang, Dai Kui, and Wang Zhiying. Control Flow Checking and Recovering by Compiler Signatures and Hardware Checking[J]. Journal of Computer Research and Development, 2009, 46(2): 345-351.
Citation: Gong Rui, Chen Wei, Liu Fang, Dai Kui, and Wang Zhiying. Control Flow Checking and Recovering by Compiler Signatures and Hardware Checking[J]. Journal of Computer Research and Development, 2009, 46(2): 345-351.

Control Flow Checking and Recovering by Compiler Signatures and Hardware Checking

More Information
  • Published Date: February 14, 2009
  • With the exponential increase in the transistors per chip, microprocessors are becoming more susceptible to soft errors. Control flow checking has been proved effective in promoting soft error tolerant ability of microprocessors. The conventional control flow checking method inserts large number of signature instructions in the program by compiler. So it imposes large overheads on both binary code size and program execution performance. Moreover, the conventional control flow checking method does not consider the recovery from control flow errors. A new method, control flow checking and recovering by compiler signatures and hardware checking (CFCCH), is proposed in this paper to solve the aforementioned problems. CFCCH uses a compiler to insert signature data, not signature instructions, in the program to reduce the binary code size. Hardware checking is automatically triggered after the branch/jump instruction so that the execution cycles of the checking operation can be reduced. Hardware implemented context saving and recovering is also proposed to provide fast recovering from control flow errors. CFCCH based on 8051 architecture is implemented in this paper. Random faults are injected in the 8051 microcontroller with CFCCH to evaluate the soft error tolerant ability. The experimental results demonstrate that compared with the conventional control flow checking method, CFCCH can efficiently reduce the binary code size and program execution time while keeping the same soft error tolerant ability.
  • Related Articles

    [1]Cai Huayang, Huang Xing, Liu Genggeng. Control Logic Routing for Continuous-Flow Microfluidic Biochips Using Deep Reinforcement Learning[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440034
    [2]Yin Xiaokang, Lu Bin, Cai Ruijie, Zhu Xiaoya, Yang Qichao, Liu Shengli. Memory Copy Function Identification Technique with Control Flow and Data Flow Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 326-340. DOI: 10.7544/issn1000-1239.202110990
    [3]Yang An, Hu Yan, Zhou Liang, Zheng Weimin, Shi Zhiqiang, Sun Limin. An Industrial Control System Anomaly Detection Algorithm Fusion by Information Flow and State Flow[J]. Journal of Computer Research and Development, 2018, 55(11): 2532-2542. DOI: 10.7544/issn1000-1239.2018.20170671
    [4]Chen Zhe, Wang Zhi, Wang Xiaochu, Jia Chunfu. Using Code Mobility to Obfuscate Control Flow in Binary Codes[J]. Journal of Computer Research and Development, 2015, 52(8): 1902-1909. DOI: 10.7544/issn1000-1239.2015.20140607
    [5]Zuo Qingyun, Chen Ming, Ding Ke, Xing Changyou, Zhang Guomin, Xu Bo. Eliminating Redundant Control Messages in OpenFlow Networks[J]. Journal of Computer Research and Development, 2014, 51(11): 2448-2457. DOI: 10.7544/issn1000-1239.2014.20130852
    [6]Xu Jianjun, Tan Qingping, Li Jianli, and Li Jianming. An Extendable Control Flow Checking Method Based on Formatted Signatures[J]. Journal of Computer Research and Development, 2011, 48(4): 638-646.
    [7]Wu Yanxia, Gu Guochang, Dai Kui, Liu Haibo, Shen Jing. A Hard/Soft Integrated Control Flow Checking Method at Assembly Level[J]. Journal of Computer Research and Development, 2010, 47(8): 1481-1489.
    [8]Xiao Canwen, Zhang Minxuan, Guo Feng. Dimensional Bubble Flow Control and Adaptive Routing Algorithm in Torus Networks[J]. Journal of Computer Research and Development, 2007, 44(9): 1510-1517.
    [9]Yu Wanjun, Liu Dayou, Liu Quan, Yang Bo. An Approach to Monitoring and Controlling Workflow Systems Based on the Instance State[J]. Journal of Computer Research and Development, 2006, 43(8): 1345-1353.
    [10]Xu Wei, Wei Jun, Li Jing. A Service-Oriented Workflow Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(8): 1369-1375.

Catalog

    Article views (766) PDF downloads (417) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return