Unlock instant, AI-driven research and patent intelligence for your innovation.

A monitoring device and method for malicious read-write programs oriented to non-volatile memory

A non-volatile memory technology, applied in computer security devices, instruments, platform integrity maintenance, etc., can solve problems such as slow PM reading time, limited number of reads and writes, unbalanced reads and writes, etc.

Active Publication Date: 2018-12-25
SHANGHAI JIAOTONG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] PM: Persistent Memory, non-volatile memory or persistent memory, STTRAM, PCM, and RRAM all belong to PM, which is characterized by no loss of information after power failure, and byte addressing; but the number of reads and writes is limited, and read and write Unbalanced, depending on the material, the PM write time is about 4 to 10 times the read time, and the PM read time is 1 to 4 times slower than DRAM

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A monitoring device and method for malicious read-write programs oriented to non-volatile memory
  • A monitoring device and method for malicious read-write programs oriented to non-volatile memory
  • A monitoring device and method for malicious read-write programs oriented to non-volatile memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific embodiments.

[0080] The present invention will be further elaborated below in conjunction with the accompanying drawings. Obviously, the accompanying drawings are some embodiments of the present invention. For those skilled in the art, other accompanying drawings can also be obtained according to these drawings without creative work. .

[0081] The online detection device provided by the present invention is as figure 1 shown.

[0082] The first module includes three units: a write count management unit, a PM page loss leveling management unit, and a PM page malicious write management unit. The balanced binary sorting tree in the write times management unit has a maximum of 1000 nodes, which can record the write times of 1000 physical pages, such as figure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious read-write program monitoring device and method facing a nonvolatile memory. The malicious read-write program monitoring device comprises a first module, a second module, a third module and a fourth module. The first module comprises a write frequency management unit, a PM page loss equalization management unit and a PM page malicious write management unit, and the first module is used for recording the write frequency of PM physical pages and all mapping relations of the PM physical pages. The second module comprises a counter, a PM page accumulated hit recorder, an additional register, a random number generation unit and a calculating unit, and is used for detecting the write frequency of the current program on the corresponding physical page. The third module is composed of a decision logic unit, and is used for deciding the malicious degree of the current program and corresponding equalization measures. The fourth module is composed of a DRAM_Reserve list, and is used for managing the physical page corresponding to the program which is determined to be malicious.

Description

technical field [0001] The invention belongs to the technical field of computer system structure, and in particular relates to a monitoring device and method for a malicious read-write program oriented to a non-volatile memory. Background technique [0002] In the design of computer architecture, due to the limitation of PM life, technicians should not only consider the problem of uniform loss, but also prevent malicious programs from writing to PM continuously for a long time, otherwise, PM is very easy to be damaged in a short time. Therefore, the detection and control of malicious programs specifically targeting PM is very necessary and has positive significance. However, there is little research in this area in the prior art. [0003] In this field, the terms involved are as follows. [0004] DRAM: Dynamic Random Access Memory, dynamic random access memory, that is, memory widely used at this stage, is characterized by information loss after power failure, and theoreti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/78G06F21/56
CPCG06F21/566G06F21/78
Inventor 黄林鹏朱燕民沈艳艳周纤薛栋梁
Owner SHANGHAI JIAOTONG UNIV