Supercharge Your Innovation With Domain-Expert AI Agents!

Control flow monitoring method and device and storage medium

A technology for controlling flow and monitoring points, applied to electrical components, transmission systems, etc., can solve problems such as poor monitoring effect and failure to detect all abnormalities in control flow, and achieve the effect of improving monitoring effect

Active Publication Date: 2021-01-01
NANJING SEMIDRIVE TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a control flow monitoring method, device and storage medium, which are used to solve the problem that when the control flow is monitored by setting detection points, all abnormalities of the control flow cannot be detected, resulting in poor monitoring effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control flow monitoring method and device and storage medium
  • Control flow monitoring method and device and storage medium
  • Control flow monitoring method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the following will further describe the embodiments of the present application in detail in conjunction with the accompanying drawings.

[0043] Please refer to figure 1 , which shows a flow chart of a method for monitoring a control flow provided by an embodiment of the present application, and the method for monitoring a control flow can be applied to a chip. The control flow monitoring method may include:

[0044] Step 101, determine the control flow to be executed when the chip starts.

[0045] Typically, there are multiple control flows in a chip that reside in unchangeable, fixed locations in non-volatile memory inside the chip. For example, reside in ROM (Read-Only Memory, read-only memory) or eFUSE (one-time programmable memory). If it resides in ROM, the control flow can be cured together with Boot ROM before chip tape-out; if it resides in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a control flow monitoring method and device and a storage medium, and belongs to the technical field of chip security. The method comprises the following steps: determining a control flow required to be executed when a chip is started; when the control flow is executed, obtaining an instruction address of each instruction in the control flow through hardware; detecting whether the execution process of the control flow is abnormal or not according to the instruction address; and when it is determined that the execution process of the control flow is abnormal, sending an alarm to the chip. According to the embodiment of the invention, each instruction in the control flow can be monitored, so that all anomalies of the control flow can be detected, andthe monitoring effect on the control flow is improved.

Description

technical field [0001] The embodiments of the present application relate to the technical field of chip security, and in particular to a control flow monitoring method, device, and storage medium. Background technique [0002] Boot ROM (chip startup program) is the code planned inside the chip when the chip is taped out, which is used to load the program from the external memory and start the system. Boot ROM needs to verify the legitimacy of the program on the external storage, if the program is illegal (for example, without a legal signature), it will refuse to start. It can be seen that the security of the Boot ROM is the basis of the security of the entire chip, and is often called the root of trust (Root of Trust). Therefore, it is undoubtedly of great significance to enhance the security of the Boot ROM. [0003] Once the Boot ROM is cured, it cannot be changed unless it is re-screwed. Therefore, in addition to the basic software security standards (such as no softwar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1441
Inventor 樊崇斌
Owner NANJING SEMIDRIVE TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More