Concurrent Error Detection using Signature Monitoring and Encryption

This paper presents an efficient approach to concurrent detection of program execution errors that combines signature monitoring with program encryption. Sources of detectable errors include permanent and transient hardware faults, software and hardware design faults, and computer viruses. Errors are detected by a simple monitor that uses signatures embedded in a compatibly encrypted program. The monitor concurrently decrypts the program using the processor control-bit sequences that are included in the signatures. Computer virus attacks are difficult because details of the processor’s internal operation are needed to attach compatibly encrypted code. Encryption and a small signature cache added to the monitor allow the lowest memory overhead of any proposed signature-monitoring technique. Encryption and the program memory’s error correction/detection code are combined to reduce signature-error detection latency by more than 60 times, while maintaining memory error correction/detection.

[1]  John Paul Shen,et al.  Continuous signature monitoring: efficient concurrent-detection of processor control errors , 1988, International Test Conference 1988 Proceeding@m_New Frontiers in Testing.

[2]  M. Y. Hsiao,et al.  A class of optimal minimum odd-weight-column SEC-DED codes , 1970 .

[3]  Satish M. Thatte,et al.  Concurrent Checking of Program Flow in VLSI Processors , 1982, ITC.

[4]  John Paul Shen,et al.  Processor Control Flow Monitoring Using Signatured Instruction Streams , 1987, IEEE Transactions on Computers.

[5]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[6]  Alfred V. Aho,et al.  Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.

[7]  Eugene H. Spafford,et al.  The internet worm: crisis and aftermath , 1989 .

[8]  Peter J. Denning,et al.  Computer viruses , 1989 .

[9]  Marc Tremblay,et al.  The implementation and application of micro rollback in fault-tolerant VLSI systems , 1988, [1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[10]  Eugene H. Spafford,et al.  Crisis and aftermath , 1989, Commun. ACM.

[11]  Edward J. McCluskey,et al.  Concurrent Error Detection Using Watchdog Processors - A Survey , 1988, IEEE Trans. Computers.

[12]  Algirdas Avizienis,et al.  A fault tolerance approach to computer viruses , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[13]  Fred Cohen A cryptographic checksum for integrity protection , 1987, Comput. Secur..

[14]  Mark Kenneth Joseph Architectural issues in fault-tolerant, secure computing systems , 1988 .

[15]  Masood Namjoo,et al.  Techniques for Concurrent Testing of VLSI Processor Operation , 1982, ITC.

[16]  Henry Beker,et al.  Cipher Systems: The Protection of Communications , 1982 .

[17]  Amir Herzberg,et al.  Public protection of software , 1985, TOCS.

[18]  Shu Lin,et al.  An introduction to error-correcting codes , 1970 .