Integrated circuit and method for detecting malicious code in a first-level instruction cache
A high-speed cache, integrated circuit technology, applied in the field of malicious code
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any embodiment described herein as "exemplary" need not be construed as being preferred or advantageous over other embodiments.
[0017] See figure 2 with 3 One aspect of the present invention may lie in the integrated circuit 210, which includes a processor 220, a first-level instruction cache 230 with a first storage capacity, and a second-level high-speed cache with a second storage capacity greater than the first storage capacity. Buffer memory 240. The first-level instruction cache is coupled between the processor and the second-level cache, and is configured to store a subset of the instructions stored in the second-level cache. The second-level cache is coupled between the first-level instruction cache and the external memory 250, and is configured to store a subset of the data and instructions stored in the external memory. The processor is configured to execute the i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


