A monitoring device and method for malicious read-write programs oriented to non-volatile memory
A non-volatile memory technology, applied in computer security devices, instruments, platform integrity maintenance, etc., can solve problems such as slow PM reading time, limited number of reads and writes, unbalanced reads and writes, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0079] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific embodiments.
[0080] The present invention will be further elaborated below in conjunction with the accompanying drawings. Obviously, the accompanying drawings are some embodiments of the present invention. For those skilled in the art, other accompanying drawings can also be obtained according to these drawings without creative work. .
[0081] The online detection device provided by the present invention is as figure 1 shown.
[0082] The first module includes three units: a write count management unit, a PM page loss leveling management unit, and a PM page malicious write management unit. The balanced binary sorting tree in the write times management unit has a maximum of 1000 nodes, which can record the write times of 1000 physical pages, such as figure...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


