US20190347408A1 - Process identifier transition monitoring and assessment - Google Patents

Process identifier transition monitoring and assessment Download PDF

Info

Publication number
US20190347408A1
US20190347408A1 US15/977,134 US201815977134A US2019347408A1 US 20190347408 A1 US20190347408 A1 US 20190347408A1 US 201815977134 A US201815977134 A US 201815977134A US 2019347408 A1 US2019347408 A1 US 2019347408A1
Authority
US
United States
Prior art keywords
process identifier
transition
processor
illegitimate
data processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/977,134
Inventor
Markus Regner
Florian Frank Ebert
Peter Seibold
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NXP USA Inc
Original Assignee
Freescale Semiconductor Inc
NXP USA Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Freescale Semiconductor Inc, NXP USA Inc filed Critical Freescale Semiconductor Inc
Priority to US15/977,134 priority Critical patent/US20190347408A1/en
Assigned to NXP USA, INC. reassignment NXP USA, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: REGNER, MARKUS, EBERT, FLORIAN FRANK, SEIBOLD, PETER
Publication of US20190347408A1 publication Critical patent/US20190347408A1/en
Priority to US17/523,748 priority patent/US11675897B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0721Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment within a central processing unit [CPU]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0751Error or fault detection not based on redundancy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/079Root cause analysis, i.e. error or fault diagnosis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0793Remedial or corrective actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3024Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a central processing unit [CPU]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Definitions

  • the present disclosure relates in general to data processing systems, and in particular, monitoring and assessing activities occurring within a microprocessor or microcontroller.
  • microcontrollers continue to be proliferated throughout more and more aspects and tools of everyday society, including home appliances, lighting, etc., and are interconnected within Internet of Things (“IOT”) networks, it is important to maintain the integrity of each of these systems. Not only do consumers expect such smart devices to consistently operate as expected, but also without concern for any breaches in security. For example, as society moves ever closer to the wide-spread adoption of autonomous vehicles, the numerous microcontrollers within such vehicles will need to be virtually failsafe, or at least capable of taking action in cases of erroneous operations and cyberattacks.
  • IOT Internet of Things
  • Activities within a microcontroller or microprocessor operate in a predetermined order or sequence, notably, transitions from one operation, event, process, service, or thread, etc. to another.
  • a deviation from such predetermined sequences can result (e.g., an erroneous transition from one activity to an unexpected activity).
  • an impact from an alpha particle may affect a system's operation, such as by causing runaway code, or a processor “babbling idiot” failure.
  • a system may be notified of glitch attacks (i.e., an intentional disruption of the execution of one or more machine instructions) or operating modes that are supposed to be blocked from entry during operations of a system in the field (e.g., a test mode/condition or a boot mode).
  • glitch attacks i.e., an intentional disruption of the execution of one or more machine instructions
  • operating modes that are supposed to be blocked from entry during operations of a system in the field (e.g., a test mode/condition or a boot mode).
  • a deviation from a predetermined sequence may result from a failure or error in execution of application software within the microcontroller or microprocessor, such as, for example, if a serial boot mode is supposed to be entered only from a specific mode of operation, but instead is entered into from some other unexpected mode.
  • not all such erroneous transitions are directly or immediately detectable by the system.
  • FIG. 1 illustrates a block diagram of a data processing system configured in accordance with embodiments of the present disclosure.
  • FIG. 2 illustrates a schematic diagram of an exemplary software thread to process identifier (“PID”) assertion.
  • FIG. 3 illustrates a schematic diagram of examples of different software threads being executed in a processor and modifying a process identifier value accordingly.
  • FIG. 4 illustrates a schematic diagram of an example of a permission matrix for a system and method configured in accordance with embodiments of the present disclosure.
  • FIG. 5 illustrates a schematic diagram of an example of a modification of a process identifier value over time in a processor.
  • FIG. 6 illustrates a flowchart diagram of a system and process configured in accordance with embodiments of the present disclosure.
  • FIG. 7 illustrates a block diagram of a data processing system configured in accordance with embodiments of the present disclosure.
  • FIG. 8 illustrates a schematic diagram of an example of a response matrix for a system and method configured in accordance with embodiments of the present disclosure.
  • FIG. 9 illustrates a simplified block diagram of a vehicle configured in accordance with embodiments of the present disclosure.
  • aspects of the present disclosure utilize a process identifier transition monitor configured to determine when transitions from a first operation, event, process, thread, service, circumstance, etc. (herein collectively referred to as an “activity”) to another have occurred in a microcontroller or microprocessor that may indicate an occurrence of a fault or error, an occurrence of some type of system manipulation (e.g., a cyberattack), or any unexpected activity occurring with a data processing system.
  • a process identifier transition monitor configured to determine when transitions from a first operation, event, process, thread, service, circumstance, etc. (herein collectively referred to as an “activity”) to another have occurred in a microcontroller or microprocessor that may indicate an occurrence of a fault or error, an occurrence of some type of system manipulation (e.g., a cyberattack), or any unexpected activity occurring with a data processing system.
  • the process identifier transition monitor operates independently from the microcontroller or microprocessor, since in certain scenarios or specific applications, it may be detrimental to permit software executing within the microcontroller or microprocessor to monitor whether it transitioned from one activity to another, in the expected predetermined order or sequence, because in a situation where a fault or error has occurred, or in the case of a cyberattack, the software may already be compromised, or the microcontroller or microprocessor running the software may be defective.
  • FIG. 1 there is illustrated a block diagram of relative portions of a data processing system 100 configured in accordance with embodiments of the present disclosure.
  • Embodiments of the present disclosure may be implemented within any type of data processing system that utilizes a processing unit (e.g., a microprocessor or microcontroller) to perform various operations within the data processing system 100 .
  • a processing unit e.g., a microprocessor or microcontroller
  • results of operations performed by the processor 101 may be output from the system 100 via a system connection 106 .
  • the data processing system 100 may include various other components not shown, but which are well-known by those of ordinary skill in the art to be operably coupled to a processor for performing various functions particular to a specified application of the data processing system 100 . Non-limiting examples of such components are further described herein with respect to FIG. 7 . Though only one processor 101 is illustrated in FIG. 1 , embodiments of the present disclosure are applicable to data processing systems that implement more than one such processing unit.
  • Embodiments of the present disclosure utilize a process identifier (also referred to herein as a “process ID” or “PID”), which can be modified by various activities occurring within the system 100 .
  • a process identifier is a number or other symbol (generally referred to herein as a “value”) used within an operating system kernel to uniquely identify a particular activity occurring within or affecting a processing device or unit (e.g., a microprocessor or microcontroller).
  • Modification of a value of the process identifier can result from an occurrence of one or more activities, including, but not limited to, the execution of particular software code (e.g., various threads) of a software application 102 (e.g., as associated with an application program) running within the processor 101 , events or mechanisms 104 occurring internally within the processor 101 that set the processor identifier to values specific to each of these events or mechanisms, and/or the setting of the process identifier to specific values pertaining to various system operations or hardware mechanisms 103 operating independently of the processor 101 .
  • software code e.g., various threads
  • a software application 102 e.g., as associated with an application program
  • events or mechanisms 104 occurring internally within the processor 101 that set the processor identifier to values specific to each of these events or mechanisms, and/or the setting of the process identifier to specific values pertaining to various system operations or hardware mechanisms 103 operating independently of the processor 101 .
  • Tracking of the process identifier values may be implemented within a software or hardware unit 105 implemented within the processor 101 , which will hereinafter be simply referred to as the PID unit 105 .
  • Embodiments of the present disclosure may utilize an existing PID unit implemented within the data processing system 100 , or may utilize a PID unit specially created within the system 100 for the purposes described herein.
  • the PID unit 105 can hold one value at a time for the process identifier, though embodiments of the present disclosure may be implemented with a PID unit 105 configured to store a plurality of process identifiers maintained in parallel.
  • the PID unit 105 may be configured to utilize a changing (transitioning) value of the process identifier to track the execution of one or more software applications within the processor 101 .
  • a software application may be separated into threads, contexts, or any other defined amount of software code, whereas the execution of each of these may affect the value of the process identifier maintained within the PID unit 105 .
  • FIG. 2 illustrates an example of how such a software application thread (also simply referred to herein as a “thread”) can set or modify a value of the process identifier within the PID unit 105 .
  • the use of the term “thread” herein and within the figures is merely for convenience, and not meant to be limiting upon the scope of the disclosure; embodiments of the present disclosure are applicable to any defined set of software code executed within the processor 101 .
  • the processor 101 will set the process identifier to a predetermined value (denoted as “Set PID to value y” in FIG. 2 ). For example, execution of a first thread may cause the process identifier within the PID unit 105 to have a first value, while a subsequent thread will then cause the process identifier within the PID unit 105 to become a second different value (or the same value in certain instances as further described herein).
  • the setting of the process identifier value (e.g., value y) within the PID unit 105 may occur at a delayed time (“t”) period from when the thread began executing within the processor 101 .
  • t delayed time
  • the foregoing is valid for other activities influencing or affecting the value of the process identifier within the PID unit 105 (e.g., the system hardware mechanisms 103 and the processor-internal mechanisms 104 ).
  • the process identifier value within the PID unit 105 may also be set or modified by system operations or hardware mechanisms 103 running within the data processing system 100 , but not within the processor 101 .
  • Such system operations or hardware mechanisms 103 may occur independently, or even in parallel, to the execution of application software within the processor 101 .
  • Examples of such system operations or hardware mechanisms 103 include, but are not limited to, the start of a self-test within some section of hardware implemented within the data processing system 100 , the entering of a specific state (e.g., an idle state) by a software or hardware unit (other than the processor 101 ) within the data processing system 100 or a peripheral device coupled to the data processing system 100 , and exceptions or interruptions occurring within the data processing system 100 .
  • Processor-internal mechanisms 104 may also be configured within the processor 101 to set or modify the process identifier value within the PID unit 105 .
  • Non-limiting examples of such processor-internal mechanisms 104 include, but are not limited to, the processor 101 entering a reset state, exiting a lock step-mode, or entering a decoupled parallel mode, internal performance monitor failures within the processor 101 , a floating-point calculation error, or any internal failures or exceptions occurring within the processor 101 that are not caused directly via an influence external to the processor 101 .
  • FIG. 3 illustrates a schematic diagram of a non-limiting example of the execution in the processor 101 of different threads (denoted as Threads A through F in FIG. 3 ) over time (“t”) and the resulting assertion (e.g., setting or modification) of the process identifier value within the PID unit 105 .
  • the start of the Thread A causes the process identifier within the PID unit 105 to be set to a value of “0”; the start of the Thread B causes the process identifier to transition to a value of “1”; the start of the Thread C causes the process identifier to transition to a value of “2”; the start of the Thread D causes the process identifier to remain at a value of “2”; the start of the Thread E causes the process identifier to transition to a value of “3,” and then later during the execution of the Thread E by the processor 101 , the process identifier is modified to a value of “4”; and, the start of the Thread F causes the process identifier to transition to a value of “1.”
  • a particular thread may result in assertions of the process identifier within the PID unit 105 to equal values (e.g., see the Threads C and D), and a particular thread may cause the process identifier value to transition to one or more different values (e.g., see the Thread E).
  • embodiments of the present disclosure may be configured to recognize such process identifier value transitions as legitimate.
  • embodiments of the present disclosure implement a PID transition monitor 107 coupled to the PID unit 105 and configured to monitor the changing (transitioning) values of the process identifier within the PID unit 105 .
  • Embodiments of the present disclosure may implement the PID transition monitor 107 in hardware (e.g., an IP module) within the integrated circuitry implementing the processor 101 , or as software running within the processor 101 .
  • the PID transition monitor 107 may be configured so that it is not readily accessible by an end user or after final installation (e.g., such as by a software application executed within the processor 101 ) for security reasons.
  • the PID transition monitor 107 is configured to monitor transitions of the process identifier within the PID unit 105 from one value to another, and then utilize such transitions to consult a predetermined assessment configuration set within the PID transition monitor 107 to determine whether each of the transitions is legitimate or illegitimate.
  • a predetermined assessment configuration may be implemented in any suitable manner, such as within a stored database, state machine, or lookup table.
  • an assessment configuration may be implemented as a permission matrix (e.g., see FIG. 4 ) that reflects possible process identifier transitions from one value to another, and defines in a predetermined manner (e.g., by the system designer, manufacturer, or an end user) whether each such process identifier transition is to be considered legitimate or illegitimate.
  • a legitimate transition of process identifier values (herein also referred to as a “legitimate process identifier transition”) is considered to represent an expected or acceptable activity occurring within the processor 101 , or the system 100 as a whole.
  • an illegitimate transition of process identifier values (herein also referred to as an “illegitimate process identifier transition”) is considered to represent an unexpected, unacceptable, undesirable, unwanted, or erroneous activity occurring within the processor 101 , or the system 100 as a whole, or the processor 101 , or the system 100 as a whole, entering an unknown or unexpected state of operation.
  • an illegitimate process identifier transition may include an occurrence of any specific activity within the processor 101 , or the system 100 as a whole, as predetermined by the system designer, manufacturer, or an end user.
  • an illegitimate process identifier transition may represent an occurrence of some sort of activity that does not fall within one of the predetermined legitimate process identifier transitions (e.g., as programmed within a permission matrix as described herein with respect to FIG. 4 ).
  • examples of an illegitimate process identifier transition include, but are not limited to, the occurrence of an error or fault resulting from the execution of application software within the processor 101 , unexpected activity occurring within some section of hardware within the data processing system 100 (e.g., see the system hardware mechanisms 103 in FIG. 1 ) that has affected the value of the process identifier within the PID unit 105 , or an unexpected occurrence of some type of processor-internal mechanism 104 within the processor 101 .
  • Examples of unexpected activities occurring within the processor 101 (or the system 100 ) include, but are not limited to, an attack upon the system 100 by a third party hacker (e.g., a glitch attack, a physical attack upon the device in which the system 100 is packaged (e.g., a probing or laser attack), an overclocking attack, or an electromagnetic induction attack), the processor 101 transitioning from executing application software to entering a boot mode or a function such as a serial boot mode, a runaway of software code during execution of application software (e.g., resulting from damage to hardware within the processor 101 (or the system 100 ) by an alpha particle impact), and the occurrence of a certain predetermined activity monitored by the system 100 .
  • a third party hacker e.g., a glitch attack, a physical attack upon the device in which the system 100 is packaged (e.g., a probing or laser attack), an overclocking attack, or an electromagnetic induction attack
  • the processor 101 transitioning from executing application software to entering a boot mode
  • Examples of system hardware mechanisms 103 that may result in an illegitimate process identifier transition include, but are not limited to, starting of a system internal hardware self-test that runs within the system 100 but also affects the processor 101 , a module within the system 100 but located externally from the processor 101 that causes an adverse effect upon the operation or functionality of the processor 101 (e.g., a system clock configuration module, which may cause the processor 101 to run according to a slow safe clock frequency instead of at a full system frequency rate), a processor 101 exception entry caused by a software instruction fetch error or a non-maskable interrupt, and a debugger connection to the system 100 that transitions the processor 101 into a debug condition or state.
  • a system clock configuration module which may cause the processor 101 to run according to a slow safe clock frequency instead of at a full system frequency rate
  • a processor 101 exception entry caused by a software instruction fetch error or a non-maskable interrupt
  • a debugger connection to the system 100 that transitions the processor 101 into a debug
  • processor-internal mechanisms that may result in an illegitimate process identifier transition include, but are not limited to, processor 101 internal failures or exceptions that are not caused directly via an external influence (e.g., an internal performance monitor failure within the processor 101 or a floating-point calculation error).
  • the PID transition monitor 107 may be accessible by the designer, manufacturer, or an end user of the system 100 via a software interface 108 . It is well-known in the art for microcontroller and microprocessor cores to be configured, driven, or maintained through such software interfaces (and possibly accompanied with corresponding software executable within the processor 101 ).
  • the software interface 108 may be implemented as memory-mapped registers or a dedicated memory module. Such a software interface 108 may be configured to enable the designer, manufacturer, or an user to configure the PID transition monitor 107 , such as to program within the PID transition monitor 107 (e.g., within a permission matrix as described with respect to FIG.
  • process identifier transitions are to be predetermined as legitimate and illegitimate, to configure predetermined actions, responses, or output signals resulting from identified legitimate or illegitimate process identifier transitions (e.g., within a matrix as described with respect to FIG. 8 ), to lock any such configurations from further modifications, and/or to monitor the status of the PID transition monitor 107 .
  • FIGS. 4-5 illustrate a non-limiting example of how the PID transition monitor 107 may be configured (predetermined) to assess (e.g., monitor for legitimate and illegitimate) process identifier transitions occurring within the PID unit 105 .
  • FIG. 4 illustrates a non-limiting example of a permission matrix that may be configured within the PID transition monitor 107 , which stores and represents predetermined legitimate and illegitimate process identifier transitions. As previously disclosed, such a permission matrix may be implemented by any suitable configuration within the PID transition monitor 107 , such as by utilization of a database, state machine, or lookup table.
  • a value of “1” in a cell represents a legitimate transition of process identifier values (i.e., the process identifier value within the PID unit 105 after the transition of its value from its previous value has been configured within the permission matrix to be a legitimate process identifier transition), while a “0” value in a cell within the permission matrix represents that such a transition in the process identifier value is considered to be an illegitimate process identifier transition.
  • FIG. 5 illustrates exemplary runtime transitions of the process identifier values within the PID unit 105 as monitored by the PID transition monitor 107 , and how the exemplary permission matrix of FIG. 4 can be utilized by the PID transition monitor 107 to determine which process identifier transitions are legitimate or illegitimate.
  • FIG. 5 demonstrates how the PID transition monitor 107 utilizes the permission matrix of FIG. 4 to determine that the process identifier transitions from values of “2” to “3” and from “4” to “0” are considered by the PID transition monitor 107 to be legitimate process identifier transitions.
  • FIG. 5 demonstrates how the PID transition monitor 107 utilizes the permission matrix of FIG. 4 to determine that the process identifier transitions from values of “0” to “2” and from “1” to “0” are considered by the PID transition monitor 107 to be illegitimate process identifier transitions.
  • FIG. 6 there is illustrated a flowchart diagram of a system and process 600 configured within the PID transition monitor 107 in accordance with embodiments of the present disclosure.
  • the system and process 600 is configured to utilize predetermined selections made by the designer, manufacturer, or an end user of the system 100 for which process identifier transitions are to be considered legitimate or illegitimate, and resulting actions to be taken by the PID transition monitor 107 in response thereto.
  • the PID transition monitor 107 captures a monitored process identifier value from the PID unit 105 . Monitoring and capturing of the process identifier values from the PID unit 105 may be performed in any suitable manner, and is within the capabilities of those of ordinary skill in the art.
  • the PID transition monitor 107 determines whether a transition of the process identifier value within the PID unit 105 has occurred (for example, during a following cycle of an execution by the processor 101 of a software application). If the process identifier value has not changed, then the system and process 600 returns to the process block 601 to repeat the process block 601 .
  • the process blocks 601 - 602 may be configured to loop until a transition of the process identifier values has been detected (e.g., see FIG. 5 ). Once a transition of process identifier values is detected within the process block 602 , the system and process 600 proceeds to the process block 603 to capture the new value of the process identifier occurring after the transition.
  • the PID transition monitor 107 utilizes the process identifier value captured from the PID unit 105 before the transition (see the process block 601 ) and the process identifier value captured from the PID unit 105 after the transition (see the process block 603 ) to determine whether the transition of these process identifier values has been predetermined to be a legitimate or illegitimate process identifier transition. For example, referring to the exemplary permission matrix of FIG. 4 , if the content of the cell representing the transition of these process identifier values has a value of “1,” then the PID transition monitor 107 will determine that this transition of the process identifier values is legitimate, and the system and process 600 will return to the process block 601 .
  • the PID transition monitor 107 determines that the transition of these process identifier values represents an illegitimate transition (e.g., the cell within the performance matrix has a value of “0”), then the system and process 600 will proceed to the process block 605 to record that an illegitimate transition of the process identifier values has occurred within the PID unit 105 , which may also include what type of illegitimate transition has occurred.
  • an illegitimate transition e.g., the cell within the performance matrix has a value of “0”
  • the permission matrix may be configured to also store, for one or more of the illegitimate transitions, an identification of a reason or cause for the illegitimate transition (e.g., a PID transition from “3” to “0” may be identified within the permission matrix as representing an interrupt request, a glitch attack, etc.).
  • an identification of a reason or cause for the illegitimate transition e.g., a PID transition from “3” to “0” may be identified within the permission matrix as representing an interrupt request, a glitch attack, etc.
  • the PID transition monitor 107 may then identify a type of response or reaction to trigger in response to the particular identified illegitimate process identifier transition.
  • a type of response or reaction to trigger in response to the particular identified illegitimate process identifier transition Referring to FIG. 8 , there is illustrated a non-limiting example of a matrix (which may be implemented as any suitable database, lookup table, or state machine within the PID transition monitor 107 ) in which is recorded different types of reactions, responses, messages, or other signal types that may be triggered or initiated by the process block 607 as a function of one or more of the particular illegitimate process identifier transitions identified by the process block 606 .
  • the reaction types of FIG. 8 match (on a cell-by-cell basis in each matrix) with the legitimate and illegitimate process identifier transitions of FIG. 4 .
  • the exemplary matrix in FIG. 8 has certain illegitimate process identifier transitions programmed with reactions or responses of a functional reset, other illegitimate process identifier transitions programmed with reactions or responses of a destructive reset, and still other illegitimate process identifier transitions programmed with a reaction or response to enter a safe mode or safe condition.
  • a functional reset may pertain to a reset reaction which only partially resets specific areas of the system 100 back into a known state
  • a destructive reset may pertain to a reset reaction that resets the entire system 100 back into a known state
  • a safe mode or safe condition may pertain to a situation where the system 100 does not undergo a reset, but another less radical process may be performed within the system 100 such as a process to curtail or even repair the problem for which the illegitimate process identifier transition was initiated.
  • other types of reactions or responses may be programmed into the PID transition monitor 107 that are not shown in FIG.
  • the matrix of FIG. 8 may be configured to record that no reaction or response will be taken for legitimate process identifier transitions.
  • Embodiments of the present disclosure are to not be limited to the foregoing reaction or response types; the system 100 may be configured to take any preprogrammed reaction or response desired by the designer, manufacturer, or an end user.
  • the PID transition monitor 107 may trigger an output one of the aforementioned predetermined reactions or responses on the PID transition error 109 transmission line to be transmitted to the data processing system 100 (e.g., to a designated circuit, module, the processor 101 to be processed according to some sort of preselected algorithm, or for transmission to circuitry external to the system 100 ).
  • the PID transition monitor 107 may be configured to output a predetermined message, or other signal type, of the PID transition error 109 transmission line.
  • FIG. 9 illustrates a simplified block diagram of a vehicle 900 configured in accordance with certain embodiments of the present disclosure, which exemplifies a potential application of utilization of embodiments of the present disclosure. Note that the embodiments described with respect to FIG. 9 are not meant to limit the potential applications of embodiments of the present disclosure.
  • the vehicle 900 is not limited to the configuration illustrated in FIG. 9 .
  • the vehicle 900 may be any type of motorized device, including a motor vehicle having a drive train 902 for causing movement of the vehicle 900 .
  • the vehicle 900 may be an autonomous vehicle.
  • the drive train 902 may be configured as an internal combustion engine, a hybrid drive train, or one that is all electric. Details of the drive train 902 , and other aspects of the vehicle 900 , are not provided herein for the sake of simplicity.
  • one or more aspects of the drive train 902 may be monitored and/or controlled by a vehicle system controller 901 .
  • the system 100 (see FIG. 1 ) may be coupled to the vehicle system controller 901 via the system connection 106 .
  • the PID transition error transmission line 109 may be coupled to the system connection 106 so that one of the aforementioned predetermined reactions, responses, messages, or other signal types may be transmitted to the vehicle system controller 901 via the system connection 106 .
  • an illegitimate process identifier transition has occurred (e.g., see the process blocks 604 - 606 of FIG.
  • a predetermined response may be transmitted to the vehicle system controller 901 so that it can take appropriate action in response to the receipt thereof.
  • a non-limiting example includes the vehicle system controller 901 presenting a warning (e.g., a check engine light) in a well-known manner to the driver or passenger of the vehicle 900 that there is a problem associated with a system implemented within the vehicle 900 (e.g., the system 100 ).
  • a warning e.g., a check engine light
  • the vehicle system controller 901 may be configured to shut down the drive train 902 in a well-known manner.
  • FIG. 7 a block diagram of a data processing system 700 is depicted in which aspects of embodiments of the present disclosure may be implemented.
  • the data processing system 700 in part, is disclosed herein to present non-limiting examples of how various software or hardware devices external to a microprocessor or microcontroller configured in accordance with embodiments described herein with respect to FIGS. 1-6 and 8-9 may cause process identifier transitions within the microprocessor or microcontroller (e.g., the processor 101 ), which are then detected by the PID transition monitor 107 .
  • Various embodiments of the system 700 may be configured with the relevant components described with respect to the system 100 of FIG. 1 .
  • Embodiments of the present disclosure are not to be limited to implementation within a system as particularly illustrated within FIG. 7 .
  • the vehicle system controller 901 may be implemented with various aspects of the system 700 . (Note that the terms “data processing system,” “computer,” “system,” and “computer system” may be interchangeably used herein.)
  • the data processing system 700 may employ a local bus 705 (e.g., a peripheral component interconnect (“PCI”) local bus architecture).
  • PCI peripheral component interconnect
  • Other suitable bus architectures such as Accelerated Graphics Port (“AGP”) and Industry Standard Architecture (“ISA”), may be used, among others.
  • a microprocessor or microcontroller (“CPU”) 715 e.g., the processor 101 of FIG. 1
  • RAM volatile memory
  • ROM non-volatile memory 735
  • Such a PCI Bridge also may include an integrated memory controller (not shown) and cache memory (not shown) for the processor 715 .
  • Additional connections to the local bus 705 may be made through direct component interconnections or through add-in boards.
  • a network communication adapter 725 (which may be configured to couple the system 700 to a local area network (“LAN”) or wide area network (“WAN”)), a small computer system interface (“SCSI”) host bus adapter (not shown), and/or expansion bus interface (not shown) may be coupled to the local bus 705 .
  • An audio adapter (not shown), graphics adapter (not shown), and/or audio/display adapter 714 may be coupled to the local bus 705 .
  • the audio/display adapter 714 may be coupled to a display device 736 , which may implement a touch screen display.
  • the local bus 705 may include the system connection 106 .
  • An interface may be implemented to provide a connection for a user interface adapter 730 , which may be coupled to various I/O devices, such as a keyboard 732 and/or mouse 734 , a modem (not shown), and/or additional memory (not shown).
  • a host bus I/O adapter 740 may be implemented to provide a connection for a hard disk drive 742 , tape drive 744 , and/or CD-ROM drive (not shown).
  • the network communication adapter 725 , I/O adapter 740 , display adapter 714 , user interface adapter 730 , and any other interfaces implemented within the system 700 may be coupled to the system connection 106 of FIG. 1 .
  • An operating system (which may include a kernel) may be run on the processor 715 and used to coordinate and provide control of various components within the data processing system 700 (e.g., operation of a process identifier (e.g., the PID unit 105 )); the operating system may be a commercially available operating system.
  • An object-oriented programming system such as Java, may run in conjunction with the operating system and provide calls to the operating system from Java programs or programs executing on the data processing system 700 . Instructions for the operating system, the object-oriented operating system, or application programs may be stored in the non-volatile memory 735 , which may be configured as a solid state memory or a hard disk drive, and may be loaded into the volatile memory 720 for execution by the processor 715 .
  • FIG. 7 may vary depending on the implementation or application.
  • Other internal hardware or peripheral devices such as a flash ROM (or equivalent nonvolatile memory) or optical disk drives and the like, may be used in addition to or in place of the hardware depicted in FIG. 7 .
  • embodiments of the present disclosure may be applied to a multiprocessor system in which a plurality of microprocessors and/or microcontrollers is implemented.
  • the data processing system 700 may be configured as a stand-alone system configured to be bootable without relying on some type of network communication, whether or not the data processing system 700 includes some type of network communication interface (e.g., the communication adapter 725 ).
  • the data processing system 700 may be an embedded controller, which may be configured with a ROM (e.g., the ROM 735 ) or a flash ROM providing non-volatile memory storing operating system files, one or more application programs, and/or user-generated data.
  • FIG. 7 The depicted example in FIG. 7 and above-described examples described with respect to FIGS. 1-6 and 8-9 are not meant to imply architectural limitations.
  • a computer program configured in accordance with embodiments of the present disclosure may reside on any computer readable storage medium (e.g., a floppy disk, a compact disk, a hard disk (e.g., the hard drive 742 ), a tape drive (e.g., the tape drive 744 ), solid state memory (e.g., the ROM 735 , the RAM 720 , etc.) used by a computer system.
  • any computer readable storage medium e.g., a floppy disk, a compact disk, a hard disk (e.g., the hard drive 742 ), a tape drive (e.g., the tape drive 744 ), solid state memory (e.g., the ROM 735 , the RAM 720 , etc.) used by a computer system.
  • aspects of the present disclosure may be embodied as a system, process, method, or program product. Accordingly, aspects of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.), or embodiments combining software and hardware aspects that may all generally be referred to herein as a “device,” “circuit,” “circuitry,” “module,” or “system” configured to perform various operations and function disclosed herein. Furthermore, aspects of the present disclosure may take the form of a computer program product embodied in one or more computer readable storage medium(s) having computer readable program code embodied thereon. (However, any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium.)
  • a computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, biologic, atomic, or semiconductor system, apparatus, controller, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium may include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk (e.g., the hard drive 742 ), a random access memory (e.g., the RAM 720 ), a read-only memory (e.g., the ROM 735 ), an erasable programmable read-only memory (“EPROM” or Flash memory), an optical fiber, a portable compact disc read-only memory (“CD-ROM”), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
  • an electrical connection having one or more wires a portable computer diskette, a hard disk (e.g., the hard drive 742 ), a random access memory (e.
  • a computer readable storage medium may be any tangible medium that can contain or store a program or software instructions or code (e.g., threads) for use by or in connection with an instruction execution system, apparatus, processor (e.g., the processor 101 or the processor 715 ), controller (e.g., microcontroller), or device.
  • Program (software) code embodied on a computer readable signal medium may be transmitted using any appropriate medium, including but not limited to wireless, wire line, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electromagnetic, optical, or any suitable combination thereof.
  • a computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, processor (e.g., the processor 101 or the processor 715 ), controller (e.g., microcontroller), or device.
  • each block in the flowchart or block diagrams, and depictions within the schematic diagrams may represent circuitry, a circuit, a module, a segment, or a portion of code that includes one or more executable program instructions for implementing the specified logical function(s).
  • the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in a reverse order, depending upon the functionality involved.
  • program instructions may be provided to a microprocessor or microcontroller of a general purpose computer, special purpose computer or device, IP module, or other programmable data processing apparatus (e.g., microcontroller) to produce a machine, such that the instructions, which execute via the microprocessor or microcontroller of the computer, device, IP module, or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart or block diagram block or blocks, or functions represented or exemplified within the schematic diagrams.
  • a microprocessor or microcontroller of a general purpose computer, special purpose computer or device, IP module, or other programmable data processing apparatus e.g., microcontroller
  • each block of the block diagrams or flowchart diagram illustration, and combinations of blocks in the block diagrams or flowchart diagram illustration, or functions represented or exemplified within the schematic diagrams can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
  • a module e.g., an IP module
  • the PID transition monitor 107 may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, controllers, or other discrete components.
  • a module e.g., an IP module
  • the PID transition monitor 107 may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, or the like.
  • Computer program code i.e., instructions, for carrying out operations for aspects of the present disclosure (such as the system and process 600 or functionalities described herein with respect to FIGS. 1-6 and 8-9 ) may be written in any combination of one or more programming languages, including, but not limited to, an object-oriented programming language such as Java, Smalltalk, C++, or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
  • object-oriented programming language such as Java, Smalltalk, C++, or the like
  • conventional procedural programming languages such as the “C” programming language or similar programming languages.
  • program instructions may also be stored in a computer readable storage medium that can direct a data processing system (e.g., the system 100 , the system 700 , or the vehicle system controller 901 ), other programmable data processing apparatus, microcontroller, IP module, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions that implement the functions/acts specified in the flowchart or block diagram block or blocks, or functions represented or exemplified within the schematic diagrams.
  • a data processing system e.g., the system 100 , the system 700 , or the vehicle system controller 901
  • other programmable data processing apparatus e.g., the system 100 , the system 700 , or the vehicle system controller 901
  • microcontroller e.g., the system 100 , the system 700 , or the vehicle system controller 901
  • IP module e.g., IP module, or other devices
  • the program instructions may also be loaded onto a data processing system (e.g., the system 100 , the system 700 , or the vehicle system controller 901 ), other programmable data processing apparatus, microcontroller, IP module, or other devices (e.g., via the software interface 108 ) to cause a series of operational steps to be performed, so as to produce a computer-implemented process such that the instructions that execute on the data processing system, other programmable data processing apparatus, microcontroller, IP module, or other devices provide processes for implementing the functions/acts specified in the flowchart or block diagram block or blocks, or functions represented or exemplified within the schematic diagrams.
  • a data processing system e.g., the system 100 , the system 700 , or the vehicle system controller 901
  • other programmable data processing apparatus e.g., the system 100 , the system 700 , or the vehicle system controller 901
  • microcontroller e.g., the vehicle system controller 901
  • IP module e.g., via the software
  • One or more types of databases may be included in the system 100 (or the system 700 , or the vehicle system controller 901 ) suitable for storing and providing access to data for the various implementations (e.g., for implementing a performance matrix such as described with respect to FIG. 4 or the matrix described with respect to FIG. 8 ).
  • any databases, systems, or components of the present disclosure may include any combination of databases or components at a single location or at multiple locations, wherein each database or system may include any of various suitable security features, such as firewalls, access codes, encryption, de-encryption and the like.
  • the database may be any type of database, such as relational, hierarchical, object-oriented, or the like.
  • the database (e.g., parameters for determining legitimate and illegitimate PID transitions, or signals for actions taken by the PID transition monitor 107 (e.g., see the process blocks 606 and 607 in FIG. 6 )) may be organized in any suitable manner, including as data tables, lookup tables, or state machines.
  • Association of certain data may be accomplished through any data association technique known and practiced in the art (e.g., a lookup table or state machine). For example, the association may be accomplished either manually or automatically. Automatic association techniques may include, for example, a database search, a database merge, GREP, AGREP, SQL, or the like.
  • aspects of the present disclosure provide a data processing system including a processor, a process identifier unit configured to track process identifier values associated with activities occurring within the processor, and a process identifier transition monitor configured to determine when a transition of the tracked process identifier values from a first value to a second value is illegitimate.
  • the process identifier transition monitor may be configured to output a signal as a function of a determination that the transition of the tracked process identifier values is illegitimate.
  • the process identifier transition monitor may include a lookup table configured to contain entries that indicate which process identifier transitions are legitimate and which are illegitimate.
  • the illegitimate transition of the tracked process identifier values represents an error in an execution of application software in the processor. In accordance with certain aspects of the present disclosure, the illegitimate transition of the tracked process identifier values represents an occurrence of a cyberattack received within the data processing system. In accordance with certain aspects of the present disclosure, the illegitimate transition of the tracked process identifier values represents an unexpected execution in the processor of a certain first thread after execution of a certain second thread. In accordance with certain aspects of the present disclosure, the illegitimate transition of the tracked process identifier values represents an occurrence of a certain activity within the data processing system.
  • the process identifier transition monitor may be configured to capture the first and second values of the tracked process identifier and perform a lookup of the transition in the lookup table to determine whether the transition has been predetermined to be legitimate or illegitimate.
  • the process identifier transition monitor may be configured to select a predetermined response associated with the illegitimate transition, wherein the signal is delivered to a portion of the data processing system as a function of the selected predetermined response.
  • the signal may be configured to cause a vehicle to shut down its drive train.
  • the signal may be configured to cause a warning to be transmitted to a driver or passenger of a vehicle.
  • a legitimate transition of process identifier values represents an expected or acceptable activity occurring within the processor, and an illegitimate transition of process identifier values represents an unexpected, unacceptable, undesirable, unwanted, or erroneous activity occurring within the processor.
  • aspects of the present disclosure provide a method that includes monitoring a transition of process identifier values, and determining when the transition of process identifier values represents an illegitimate transition of the process identifier values.
  • the method may further include triggering a predetermined response as a function of the determining of the illegitimate transition of the process identifier values.
  • the monitoring of the transition of process identifier values may further include capturing a first process identifier value from a process identifier unit associated with a processor, and capturing a second process identifier value from the process identifier unit, wherein the determining when the transition of process identifier values represents the illegitimate transition of the process identifier values may further include using the first and second process identifier values to perform a lookup in a permission matrix, resulting in the determination that the transition represents the illegitimate transition.
  • the method may further include triggering a predetermined response as a function of the determining of the illegitimate transition of the process identifier values.
  • the predetermined response is a reset of the processor to a predetermined known state.
  • the predetermined response is a signal sent to a vehicle system controller that is configured to perform a specified function in response to the signal.
  • the illegitimate transition represents an occurrence of a certain activity within a data processing system containing the processor.
  • the certain activity is selected from the group consisting of an execution of unexpected software code by the processor, an occurrence of a cyberattack received within the data processing system, a failure of a hardware mechanism external to the processor in the data processing system, and a failure or error occurring in the processor.
  • aspects of the present disclosure provide a data processing system that includes a processor, a process identifier unit configured to track process identifier values associated with activities occurring within the processor, and a process identifier transition monitor configured to determine whether a transition of the tracked process identifier values from a first value to a second value is legitimate or illegitimate, wherein the process identifier transition monitor further includes circuitry for capturing the first process identifier value from the process identifier unit, circuitry for capturing the second process identifier value from the process identifier unit, circuitry for performing a lookup in a permission matrix configured to contain entries that indicate which transitions of tracked process identifier values are legitimate and which transitions of tracked process identifier values are illegitimate, circuitry for determining from the entries in the permission matrix that the transition of the tracked process identifier values from the first value to the second value represents an illegitimate transition of process identifier values, and circuitry for triggering a predetermined response to the determination that the transition of the tracked process identifier
  • the illegitimate transition of the tracked process identifier values may represent the processor entering an unknown or unexpected state of operation.
  • the predetermined response may include resetting the processor to a known state of operation, rebooting the processor, or deactivating the data processing system.
  • the term “or” may be intended to be inclusive, wherein “A or B” includes A or B and also includes both A and B.
  • the term “or” when used in the context of a listing of entities refers to the entities being present singly or in combination.
  • the phrase “A, B, C, or D” includes A, B, C, and D individually, but also includes any and all combinations and subcombinations of A, B, C, and D.
  • the term “and/or” when used in the context of a listing of entities refers to the entities being present singly or in combination.
  • the phrase “A, B, C, and/or D” includes A, B, C, and D individually, but also includes any and all combinations and subcombinations of A, B, C, and D.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Debugging And Monitoring (AREA)

Abstract

A process identifier transition monitor captures and assesses activities associated with a microprocessor or a microcontroller. Monitoring and assessment is performed by detection of process identifier transitions, which may be driven by an occurrence of one or more activities, such as execution of application software, system hardware mechanisms, or processor-internal mechanisms. Process identifier transitions are assessed to determine whether such transitions were expected. If a detected process identifier transition was not expected, then a system alert may be transmitted or some other appropriate response taken within the system.

Description

    TECHNICAL FIELD
  • The present disclosure relates in general to data processing systems, and in particular, monitoring and assessing activities occurring within a microprocessor or microcontroller.
  • BACKGROUND
  • As microcontrollers continue to be proliferated throughout more and more aspects and tools of everyday society, including home appliances, lighting, etc., and are interconnected within Internet of Things (“IOT”) networks, it is important to maintain the integrity of each of these systems. Not only do consumers expect such smart devices to consistently operate as expected, but also without concern for any breaches in security. For example, as society moves ever closer to the wide-spread adoption of autonomous vehicles, the numerous microcontrollers within such vehicles will need to be virtually failsafe, or at least capable of taking action in cases of erroneous operations and cyberattacks.
  • Activities within a microcontroller or microprocessor operate in a predetermined order or sequence, notably, transitions from one operation, event, process, service, or thread, etc. to another. In case of some type of fault or error occurring within such activities, or in case of some sort of intentional system manipulation by a third party (e.g., a cyberattack), a deviation from such predetermined sequences can result (e.g., an erroneous transition from one activity to an unexpected activity). For example, an impact from an alpha particle may affect a system's operation, such as by causing runaway code, or a processor “babbling idiot” failure. From a security point of view, there may be a desire for a system to be notified of glitch attacks (i.e., an intentional disruption of the execution of one or more machine instructions) or operating modes that are supposed to be blocked from entry during operations of a system in the field (e.g., a test mode/condition or a boot mode). Furthermore, a deviation from a predetermined sequence may result from a failure or error in execution of application software within the microcontroller or microprocessor, such as, for example, if a serial boot mode is supposed to be entered only from a specific mode of operation, but instead is entered into from some other unexpected mode. However, not all such erroneous transitions are directly or immediately detectable by the system.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates a block diagram of a data processing system configured in accordance with embodiments of the present disclosure.
  • FIG. 2 illustrates a schematic diagram of an exemplary software thread to process identifier (“PID”) assertion.
  • FIG. 3 illustrates a schematic diagram of examples of different software threads being executed in a processor and modifying a process identifier value accordingly.
  • FIG. 4 illustrates a schematic diagram of an example of a permission matrix for a system and method configured in accordance with embodiments of the present disclosure.
  • FIG. 5 illustrates a schematic diagram of an example of a modification of a process identifier value over time in a processor.
  • FIG. 6 illustrates a flowchart diagram of a system and process configured in accordance with embodiments of the present disclosure.
  • FIG. 7 illustrates a block diagram of a data processing system configured in accordance with embodiments of the present disclosure.
  • FIG. 8 illustrates a schematic diagram of an example of a response matrix for a system and method configured in accordance with embodiments of the present disclosure.
  • FIG. 9 illustrates a simplified block diagram of a vehicle configured in accordance with embodiments of the present disclosure.
  • DETAILED DESCRIPTION
  • Aspects of the present disclosure utilize a process identifier transition monitor configured to determine when transitions from a first operation, event, process, thread, service, circumstance, etc. (herein collectively referred to as an “activity”) to another have occurred in a microcontroller or microprocessor that may indicate an occurrence of a fault or error, an occurrence of some type of system manipulation (e.g., a cyberattack), or any unexpected activity occurring with a data processing system. In accordance with aspects of the present disclosure, the process identifier transition monitor operates independently from the microcontroller or microprocessor, since in certain scenarios or specific applications, it may be detrimental to permit software executing within the microcontroller or microprocessor to monitor whether it transitioned from one activity to another, in the expected predetermined order or sequence, because in a situation where a fault or error has occurred, or in the case of a cyberattack, the software may already be compromised, or the microcontroller or microprocessor running the software may be defective.
  • Referring to FIG. 1, there is illustrated a block diagram of relative portions of a data processing system 100 configured in accordance with embodiments of the present disclosure. Embodiments of the present disclosure may be implemented within any type of data processing system that utilizes a processing unit (e.g., a microprocessor or microcontroller) to perform various operations within the data processing system 100. For the sake of simplicity, such a processing unit may simply be referred to herein as the processor 101. In accordance with certain embodiments of the present disclosure, results of operations performed by the processor 101 may be output from the system 100 via a system connection 106.
  • The data processing system 100 may include various other components not shown, but which are well-known by those of ordinary skill in the art to be operably coupled to a processor for performing various functions particular to a specified application of the data processing system 100. Non-limiting examples of such components are further described herein with respect to FIG. 7. Though only one processor 101 is illustrated in FIG. 1, embodiments of the present disclosure are applicable to data processing systems that implement more than one such processing unit.
  • Embodiments of the present disclosure utilize a process identifier (also referred to herein as a “process ID” or “PID”), which can be modified by various activities occurring within the system 100. A process identifier is a number or other symbol (generally referred to herein as a “value”) used within an operating system kernel to uniquely identify a particular activity occurring within or affecting a processing device or unit (e.g., a microprocessor or microcontroller).
  • Modification of a value of the process identifier can result from an occurrence of one or more activities, including, but not limited to, the execution of particular software code (e.g., various threads) of a software application 102 (e.g., as associated with an application program) running within the processor 101, events or mechanisms 104 occurring internally within the processor 101 that set the processor identifier to values specific to each of these events or mechanisms, and/or the setting of the process identifier to specific values pertaining to various system operations or hardware mechanisms 103 operating independently of the processor 101.
  • Tracking of the process identifier values may be implemented within a software or hardware unit 105 implemented within the processor 101, which will hereinafter be simply referred to as the PID unit 105. Embodiments of the present disclosure may utilize an existing PID unit implemented within the data processing system 100, or may utilize a PID unit specially created within the system 100 for the purposes described herein. Generally, the PID unit 105 can hold one value at a time for the process identifier, though embodiments of the present disclosure may be implemented with a PID unit 105 configured to store a plurality of process identifiers maintained in parallel.
  • As previously stated, the PID unit 105 may be configured to utilize a changing (transitioning) value of the process identifier to track the execution of one or more software applications within the processor 101. For example, a software application may be separated into threads, contexts, or any other defined amount of software code, whereas the execution of each of these may affect the value of the process identifier maintained within the PID unit 105. FIG. 2 illustrates an example of how such a software application thread (also simply referred to herein as a “thread”) can set or modify a value of the process identifier within the PID unit 105. Note that the use of the term “thread” herein and within the figures is merely for convenience, and not meant to be limiting upon the scope of the disclosure; embodiments of the present disclosure are applicable to any defined set of software code executed within the processor 101.
  • Once a thread (denoted as “Thread x” in FIG. 2) begins executing within the processor 101, the processor 101 will set the process identifier to a predetermined value (denoted as “Set PID to value y” in FIG. 2). For example, execution of a first thread may cause the process identifier within the PID unit 105 to have a first value, while a subsequent thread will then cause the process identifier within the PID unit 105 to become a second different value (or the same value in certain instances as further described herein).
  • As indicated by the exemplary illustration in FIG. 2, the setting of the process identifier value (e.g., value y) within the PID unit 105 may occur at a delayed time (“t”) period from when the thread began executing within the processor 101. In accordance with embodiments of the present disclosure, it may be desired that the time (“t”) between the start of the execution of a thread within the processor 101 and its modification of the process identifier value within the PID unit 105 be minimized. The foregoing is valid for other activities influencing or affecting the value of the process identifier within the PID unit 105 (e.g., the system hardware mechanisms 103 and the processor-internal mechanisms 104).
  • As previously disclosed, the process identifier value within the PID unit 105 may also be set or modified by system operations or hardware mechanisms 103 running within the data processing system 100, but not within the processor 101. Such system operations or hardware mechanisms 103 may occur independently, or even in parallel, to the execution of application software within the processor 101. Examples of such system operations or hardware mechanisms 103 include, but are not limited to, the start of a self-test within some section of hardware implemented within the data processing system 100, the entering of a specific state (e.g., an idle state) by a software or hardware unit (other than the processor 101) within the data processing system 100 or a peripheral device coupled to the data processing system 100, and exceptions or interruptions occurring within the data processing system 100.
  • Processor-internal mechanisms 104 may also be configured within the processor 101 to set or modify the process identifier value within the PID unit 105. Non-limiting examples of such processor-internal mechanisms 104 include, but are not limited to, the processor 101 entering a reset state, exiting a lock step-mode, or entering a decoupled parallel mode, internal performance monitor failures within the processor 101, a floating-point calculation error, or any internal failures or exceptions occurring within the processor 101 that are not caused directly via an influence external to the processor 101.
  • FIG. 3 illustrates a schematic diagram of a non-limiting example of the execution in the processor 101 of different threads (denoted as Threads A through F in FIG. 3) over time (“t”) and the resulting assertion (e.g., setting or modification) of the process identifier value within the PID unit 105. In this example, the start of the Thread A causes the process identifier within the PID unit 105 to be set to a value of “0”; the start of the Thread B causes the process identifier to transition to a value of “1”; the start of the Thread C causes the process identifier to transition to a value of “2”; the start of the Thread D causes the process identifier to remain at a value of “2”; the start of the Thread E causes the process identifier to transition to a value of “3,” and then later during the execution of the Thread E by the processor 101, the process identifier is modified to a value of “4”; and, the start of the Thread F causes the process identifier to transition to a value of “1.”
  • It can be noted within this example that a particular thread may result in assertions of the process identifier within the PID unit 105 to equal values (e.g., see the Threads C and D), and a particular thread may cause the process identifier value to transition to one or more different values (e.g., see the Thread E). As will be further described herein, embodiments of the present disclosure may be configured to recognize such process identifier value transitions as legitimate.
  • Referring again to FIG. 1, embodiments of the present disclosure implement a PID transition monitor 107 coupled to the PID unit 105 and configured to monitor the changing (transitioning) values of the process identifier within the PID unit 105. Embodiments of the present disclosure may implement the PID transition monitor 107 in hardware (e.g., an IP module) within the integrated circuitry implementing the processor 101, or as software running within the processor 101. In accordance with certain embodiments of the present disclosure, whether the PID transition monitor 107 is implemented in hardware or as software, it may be configured so that it is not readily accessible by an end user or after final installation (e.g., such as by a software application executed within the processor 101) for security reasons.
  • The PID transition monitor 107 is configured to monitor transitions of the process identifier within the PID unit 105 from one value to another, and then utilize such transitions to consult a predetermined assessment configuration set within the PID transition monitor 107 to determine whether each of the transitions is legitimate or illegitimate. Such an assessment configuration may be implemented in any suitable manner, such as within a stored database, state machine, or lookup table. For example, such an assessment configuration may be implemented as a permission matrix (e.g., see FIG. 4) that reflects possible process identifier transitions from one value to another, and defines in a predetermined manner (e.g., by the system designer, manufacturer, or an end user) whether each such process identifier transition is to be considered legitimate or illegitimate. In accordance with embodiments of the present disclosure, a legitimate transition of process identifier values (herein also referred to as a “legitimate process identifier transition”) is considered to represent an expected or acceptable activity occurring within the processor 101, or the system 100 as a whole. In accordance with embodiments of the present disclosure, an illegitimate transition of process identifier values (herein also referred to as an “illegitimate process identifier transition”) is considered to represent an unexpected, unacceptable, undesirable, unwanted, or erroneous activity occurring within the processor 101, or the system 100 as a whole, or the processor 101, or the system 100 as a whole, entering an unknown or unexpected state of operation. In accordance with certain embodiments of the present disclosure, an illegitimate process identifier transition may include an occurrence of any specific activity within the processor 101, or the system 100 as a whole, as predetermined by the system designer, manufacturer, or an end user. In accordance with embodiments of the present disclosure, an illegitimate process identifier transition may represent an occurrence of some sort of activity that does not fall within one of the predetermined legitimate process identifier transitions (e.g., as programmed within a permission matrix as described herein with respect to FIG. 4).
  • In accordance with embodiments of the present disclosure, examples of an illegitimate process identifier transition include, but are not limited to, the occurrence of an error or fault resulting from the execution of application software within the processor 101, unexpected activity occurring within some section of hardware within the data processing system 100 (e.g., see the system hardware mechanisms 103 in FIG. 1) that has affected the value of the process identifier within the PID unit 105, or an unexpected occurrence of some type of processor-internal mechanism 104 within the processor 101. Examples of unexpected activities occurring within the processor 101 (or the system 100) include, but are not limited to, an attack upon the system 100 by a third party hacker (e.g., a glitch attack, a physical attack upon the device in which the system 100 is packaged (e.g., a probing or laser attack), an overclocking attack, or an electromagnetic induction attack), the processor 101 transitioning from executing application software to entering a boot mode or a function such as a serial boot mode, a runaway of software code during execution of application software (e.g., resulting from damage to hardware within the processor 101 (or the system 100) by an alpha particle impact), and the occurrence of a certain predetermined activity monitored by the system 100. Examples of system hardware mechanisms 103 that may result in an illegitimate process identifier transition include, but are not limited to, starting of a system internal hardware self-test that runs within the system 100 but also affects the processor 101, a module within the system 100 but located externally from the processor 101 that causes an adverse effect upon the operation or functionality of the processor 101 (e.g., a system clock configuration module, which may cause the processor 101 to run according to a slow safe clock frequency instead of at a full system frequency rate), a processor 101 exception entry caused by a software instruction fetch error or a non-maskable interrupt, and a debugger connection to the system 100 that transitions the processor 101 into a debug condition or state. Examples of processor-internal mechanisms that may result in an illegitimate process identifier transition include, but are not limited to, processor 101 internal failures or exceptions that are not caused directly via an external influence (e.g., an internal performance monitor failure within the processor 101 or a floating-point calculation error).
  • In accordance with certain embodiments of the present disclosure, the PID transition monitor 107 may be accessible by the designer, manufacturer, or an end user of the system 100 via a software interface 108. It is well-known in the art for microcontroller and microprocessor cores to be configured, driven, or maintained through such software interfaces (and possibly accompanied with corresponding software executable within the processor 101). The software interface 108 may be implemented as memory-mapped registers or a dedicated memory module. Such a software interface 108 may be configured to enable the designer, manufacturer, or an user to configure the PID transition monitor 107, such as to program within the PID transition monitor 107 (e.g., within a permission matrix as described with respect to FIG. 4) which process identifier transitions are to be predetermined as legitimate and illegitimate, to configure predetermined actions, responses, or output signals resulting from identified legitimate or illegitimate process identifier transitions (e.g., within a matrix as described with respect to FIG. 8), to lock any such configurations from further modifications, and/or to monitor the status of the PID transition monitor 107.
  • FIGS. 4-5 illustrate a non-limiting example of how the PID transition monitor 107 may be configured (predetermined) to assess (e.g., monitor for legitimate and illegitimate) process identifier transitions occurring within the PID unit 105. FIG. 4 illustrates a non-limiting example of a permission matrix that may be configured within the PID transition monitor 107, which stores and represents predetermined legitimate and illegitimate process identifier transitions. As previously disclosed, such a permission matrix may be implemented by any suitable configuration within the PID transition monitor 107, such as by utilization of a database, state machine, or lookup table. Within this exemplary permission matrix, a value of “1” in a cell represents a legitimate transition of process identifier values (i.e., the process identifier value within the PID unit 105 after the transition of its value from its previous value has been configured within the permission matrix to be a legitimate process identifier transition), while a “0” value in a cell within the permission matrix represents that such a transition in the process identifier value is considered to be an illegitimate process identifier transition. For example, the permission matrix of FIG. 4 has been configured, in part, to consider a transition of the process identifier from a value of “3” to a value of “1” to be a legitimate transition, while a transition of the process identifier from a value of “4” to a value of “3” is considered to be an illegitimate transition, and so on.
  • FIG. 5 illustrates exemplary runtime transitions of the process identifier values within the PID unit 105 as monitored by the PID transition monitor 107, and how the exemplary permission matrix of FIG. 4 can be utilized by the PID transition monitor 107 to determine which process identifier transitions are legitimate or illegitimate. For example, FIG. 5 demonstrates how the PID transition monitor 107 utilizes the permission matrix of FIG. 4 to determine that the process identifier transitions from values of “2” to “3” and from “4” to “0” are considered by the PID transition monitor 107 to be legitimate process identifier transitions. Correspondingly, FIG. 5 demonstrates how the PID transition monitor 107 utilizes the permission matrix of FIG. 4 to determine that the process identifier transitions from values of “0” to “2” and from “1” to “0” are considered by the PID transition monitor 107 to be illegitimate process identifier transitions.
  • Referring next to FIG. 6, there is illustrated a flowchart diagram of a system and process 600 configured within the PID transition monitor 107 in accordance with embodiments of the present disclosure. The system and process 600 is configured to utilize predetermined selections made by the designer, manufacturer, or an end user of the system 100 for which process identifier transitions are to be considered legitimate or illegitimate, and resulting actions to be taken by the PID transition monitor 107 in response thereto. In the process block 601, the PID transition monitor 107 captures a monitored process identifier value from the PID unit 105. Monitoring and capturing of the process identifier values from the PID unit 105 may be performed in any suitable manner, and is within the capabilities of those of ordinary skill in the art. In the process block 602, the PID transition monitor 107 determines whether a transition of the process identifier value within the PID unit 105 has occurred (for example, during a following cycle of an execution by the processor 101 of a software application). If the process identifier value has not changed, then the system and process 600 returns to the process block 601 to repeat the process block 601.
  • Essentially, the process blocks 601-602 may be configured to loop until a transition of the process identifier values has been detected (e.g., see FIG. 5). Once a transition of process identifier values is detected within the process block 602, the system and process 600 proceeds to the process block 603 to capture the new value of the process identifier occurring after the transition. In the process block 604, the PID transition monitor 107 utilizes the process identifier value captured from the PID unit 105 before the transition (see the process block 601) and the process identifier value captured from the PID unit 105 after the transition (see the process block 603) to determine whether the transition of these process identifier values has been predetermined to be a legitimate or illegitimate process identifier transition. For example, referring to the exemplary permission matrix of FIG. 4, if the content of the cell representing the transition of these process identifier values has a value of “1,” then the PID transition monitor 107 will determine that this transition of the process identifier values is legitimate, and the system and process 600 will return to the process block 601. However, if the PID transition monitor 107 determines that the transition of these process identifier values represents an illegitimate transition (e.g., the cell within the performance matrix has a value of “0”), then the system and process 600 will proceed to the process block 605 to record that an illegitimate transition of the process identifier values has occurred within the PID unit 105, which may also include what type of illegitimate transition has occurred. For example, the permission matrix may be configured to also store, for one or more of the illegitimate transitions, an identification of a reason or cause for the illegitimate transition (e.g., a PID transition from “3” to “0” may be identified within the permission matrix as representing an interrupt request, a glitch attack, etc.).
  • In the process block 606, the PID transition monitor 107 may then identify a type of response or reaction to trigger in response to the particular identified illegitimate process identifier transition. Referring to FIG. 8, there is illustrated a non-limiting example of a matrix (which may be implemented as any suitable database, lookup table, or state machine within the PID transition monitor 107) in which is recorded different types of reactions, responses, messages, or other signal types that may be triggered or initiated by the process block 607 as a function of one or more of the particular illegitimate process identifier transitions identified by the process block 606.
  • In this example, the reaction types of FIG. 8 match (on a cell-by-cell basis in each matrix) with the legitimate and illegitimate process identifier transitions of FIG. 4. As a consequence, the exemplary matrix in FIG. 8 has certain illegitimate process identifier transitions programmed with reactions or responses of a functional reset, other illegitimate process identifier transitions programmed with reactions or responses of a destructive reset, and still other illegitimate process identifier transitions programmed with a reaction or response to enter a safe mode or safe condition. In accordance with certain embodiments of the present disclosure, a functional reset may pertain to a reset reaction which only partially resets specific areas of the system 100 back into a known state, a destructive reset may pertain to a reset reaction that resets the entire system 100 back into a known state, and a safe mode or safe condition may pertain to a situation where the system 100 does not undergo a reset, but another less radical process may be performed within the system 100 such as a process to curtail or even repair the problem for which the illegitimate process identifier transition was initiated. In accordance with certain embodiments of the present disclosure, other types of reactions or responses may be programmed into the PID transition monitor 107 that are not shown in FIG. 8 (e.g., an exception or interrupt to another device within the system 100, other than the processor 101, which is configured to repair the system, or deactivating the data processing system 100). In accordance with certain embodiments of the present disclosure, the matrix of FIG. 8 may be configured to record that no reaction or response will be taken for legitimate process identifier transitions. Embodiments of the present disclosure are to not be limited to the foregoing reaction or response types; the system 100 may be configured to take any preprogrammed reaction or response desired by the designer, manufacturer, or an end user.
  • Referring again to FIG. 6, in the process block 607, the PID transition monitor 107 may trigger an output one of the aforementioned predetermined reactions or responses on the PID transition error 109 transmission line to be transmitted to the data processing system 100 (e.g., to a designated circuit, module, the processor 101 to be processed according to some sort of preselected algorithm, or for transmission to circuitry external to the system 100). In accordance with certain embodiments of the present disclosure, the PID transition monitor 107 may be configured to output a predetermined message, or other signal type, of the PID transition error 109 transmission line.
  • FIG. 9 illustrates a simplified block diagram of a vehicle 900 configured in accordance with certain embodiments of the present disclosure, which exemplifies a potential application of utilization of embodiments of the present disclosure. Note that the embodiments described with respect to FIG. 9 are not meant to limit the potential applications of embodiments of the present disclosure.
  • The vehicle 900 is not limited to the configuration illustrated in FIG. 9. The vehicle 900 may be any type of motorized device, including a motor vehicle having a drive train 902 for causing movement of the vehicle 900. In accordance with certain embodiments of the present disclosure, the vehicle 900 may be an autonomous vehicle. The drive train 902 may be configured as an internal combustion engine, a hybrid drive train, or one that is all electric. Details of the drive train 902, and other aspects of the vehicle 900, are not provided herein for the sake of simplicity.
  • In accordance with certain embodiments of the present disclosure, one or more aspects of the drive train 902 may be monitored and/or controlled by a vehicle system controller 901. The system 100 (see FIG. 1) may be coupled to the vehicle system controller 901 via the system connection 106. In accordance with certain embodiments of the present disclosure, the PID transition error transmission line 109 may be coupled to the system connection 106 so that one of the aforementioned predetermined reactions, responses, messages, or other signal types may be transmitted to the vehicle system controller 901 via the system connection 106. Thus, in response to a determination by the PID transition monitor 107 that an illegitimate process identifier transition has occurred (e.g., see the process blocks 604-606 of FIG. 6), a predetermined response may be transmitted to the vehicle system controller 901 so that it can take appropriate action in response to the receipt thereof. A non-limiting example includes the vehicle system controller 901 presenting a warning (e.g., a check engine light) in a well-known manner to the driver or passenger of the vehicle 900 that there is a problem associated with a system implemented within the vehicle 900 (e.g., the system 100). For example, if the vehicle 900 is an autonomous vehicle, such a warning may inform the driver or passenger that they need to begin manually driving the vehicle 900 instead of the vehicle 900 being controlled by the autonomous system. Alternatively, in response to receipt of a predetermined response (e.g., see the process block 607 of FIG. 6) by the vehicle system controller 901 from the system 100, the vehicle system controller 901 may be configured to shut down the drive train 902 in a well-known manner.
  • With reference now to FIG. 7, a block diagram of a data processing system 700 is depicted in which aspects of embodiments of the present disclosure may be implemented. The data processing system 700, in part, is disclosed herein to present non-limiting examples of how various software or hardware devices external to a microprocessor or microcontroller configured in accordance with embodiments described herein with respect to FIGS. 1-6 and 8-9 may cause process identifier transitions within the microprocessor or microcontroller (e.g., the processor 101), which are then detected by the PID transition monitor 107. Various embodiments of the system 700 may be configured with the relevant components described with respect to the system 100 of FIG. 1. Embodiments of the present disclosure are not to be limited to implementation within a system as particularly illustrated within FIG. 7. Furthermore, the vehicle system controller 901 may be implemented with various aspects of the system 700. (Note that the terms “data processing system,” “computer,” “system,” and “computer system” may be interchangeably used herein.)
  • The data processing system 700 may employ a local bus 705 (e.g., a peripheral component interconnect (“PCI”) local bus architecture). Other suitable bus architectures, such as Accelerated Graphics Port (“AGP”) and Industry Standard Architecture (“ISA”), may be used, among others. A microprocessor or microcontroller (“CPU”) 715 (e.g., the processor 101 of FIG. 1), a volatile memory (“RAM”) 720, and/or a non-volatile memory 735 (“ROM”) may be coupled to the local bus 705 (e.g., through a PCI Bridge (not shown)). Such a PCI Bridge also may include an integrated memory controller (not shown) and cache memory (not shown) for the processor 715. Additional connections to the local bus 705 may be made through direct component interconnections or through add-in boards. In the depicted example, a network communication adapter 725 (which may be configured to couple the system 700 to a local area network (“LAN”) or wide area network (“WAN”)), a small computer system interface (“SCSI”) host bus adapter (not shown), and/or expansion bus interface (not shown) may be coupled to the local bus 705. An audio adapter (not shown), graphics adapter (not shown), and/or audio/display adapter 714 may be coupled to the local bus 705. The audio/display adapter 714 may be coupled to a display device 736, which may implement a touch screen display. The local bus 705 may include the system connection 106.
  • An interface (not shown) may be implemented to provide a connection for a user interface adapter 730, which may be coupled to various I/O devices, such as a keyboard 732 and/or mouse 734, a modem (not shown), and/or additional memory (not shown). A host bus I/O adapter 740 may be implemented to provide a connection for a hard disk drive 742, tape drive 744, and/or CD-ROM drive (not shown). The network communication adapter 725, I/O adapter 740, display adapter 714, user interface adapter 730, and any other interfaces implemented within the system 700 may be coupled to the system connection 106 of FIG. 1.
  • An operating system (which may include a kernel) may be run on the processor 715 and used to coordinate and provide control of various components within the data processing system 700 (e.g., operation of a process identifier (e.g., the PID unit 105)); the operating system may be a commercially available operating system. An object-oriented programming system, such as Java, may run in conjunction with the operating system and provide calls to the operating system from Java programs or programs executing on the data processing system 700. Instructions for the operating system, the object-oriented operating system, or application programs may be stored in the non-volatile memory 735, which may be configured as a solid state memory or a hard disk drive, and may be loaded into the volatile memory 720 for execution by the processor 715.
  • Those of ordinary skill in the art will appreciate that the hardware in FIG. 7 may vary depending on the implementation or application. Other internal hardware or peripheral devices, such as a flash ROM (or equivalent nonvolatile memory) or optical disk drives and the like, may be used in addition to or in place of the hardware depicted in FIG. 7. Also, embodiments of the present disclosure may be applied to a multiprocessor system in which a plurality of microprocessors and/or microcontrollers is implemented.
  • In accordance with certain aspects of the present disclosure, the data processing system 700 may be configured as a stand-alone system configured to be bootable without relying on some type of network communication, whether or not the data processing system 700 includes some type of network communication interface (e.g., the communication adapter 725). In accordance with certain aspects of the present disclosure, the data processing system 700 may be an embedded controller, which may be configured with a ROM (e.g., the ROM 735) or a flash ROM providing non-volatile memory storing operating system files, one or more application programs, and/or user-generated data.
  • The depicted example in FIG. 7 and above-described examples described with respect to FIGS. 1-6 and 8-9 are not meant to imply architectural limitations. Further, a computer program configured in accordance with embodiments of the present disclosure (e.g., implementing the system and process 600 of FIG. 6) may reside on any computer readable storage medium (e.g., a floppy disk, a compact disk, a hard disk (e.g., the hard drive 742), a tape drive (e.g., the tape drive 744), solid state memory (e.g., the ROM 735, the RAM 720, etc.) used by a computer system.
  • As will be appreciated by one skilled in the art, aspects of the present disclosure may be embodied as a system, process, method, or program product. Accordingly, aspects of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.), or embodiments combining software and hardware aspects that may all generally be referred to herein as a “device,” “circuit,” “circuitry,” “module,” or “system” configured to perform various operations and function disclosed herein. Furthermore, aspects of the present disclosure may take the form of a computer program product embodied in one or more computer readable storage medium(s) having computer readable program code embodied thereon. (However, any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium.)
  • A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, biologic, atomic, or semiconductor system, apparatus, controller, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium may include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk (e.g., the hard drive 742), a random access memory (e.g., the RAM 720), a read-only memory (e.g., the ROM 735), an erasable programmable read-only memory (“EPROM” or Flash memory), an optical fiber, a portable compact disc read-only memory (“CD-ROM”), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In accordance with aspects of the present disclosure, a computer readable storage medium may be any tangible medium that can contain or store a program or software instructions or code (e.g., threads) for use by or in connection with an instruction execution system, apparatus, processor (e.g., the processor 101 or the processor 715), controller (e.g., microcontroller), or device. Program (software) code embodied on a computer readable signal medium may be transmitted using any appropriate medium, including but not limited to wireless, wire line, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electromagnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, processor (e.g., the processor 101 or the processor 715), controller (e.g., microcontroller), or device.
  • The flowchart diagram, block diagrams, and schematic diagrams in FIGS. 1-9 illustrate architectures, functionalities, and operations of possible implementations and applications of systems, processes, methods, and program products configured in accordance with various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams, and depictions within the schematic diagrams, may represent circuitry, a circuit, a module, a segment, or a portion of code that includes one or more executable program instructions for implementing the specified logical function(s). It should also be noted that, in some implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in a reverse order, depending upon the functionality involved.
  • These program instructions may be provided to a microprocessor or microcontroller of a general purpose computer, special purpose computer or device, IP module, or other programmable data processing apparatus (e.g., microcontroller) to produce a machine, such that the instructions, which execute via the microprocessor or microcontroller of the computer, device, IP module, or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart or block diagram block or blocks, or functions represented or exemplified within the schematic diagrams.
  • It will also be noted that each block of the block diagrams or flowchart diagram illustration, and combinations of blocks in the block diagrams or flowchart diagram illustration, or functions represented or exemplified within the schematic diagrams, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. For example, a module (e.g., an IP module), such as the PID transition monitor 107, may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, controllers, or other discrete components. A module (e.g., an IP module), such as the PID transition monitor 107, may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, or the like.
  • Computer program code, i.e., instructions, for carrying out operations for aspects of the present disclosure (such as the system and process 600 or functionalities described herein with respect to FIGS. 1-6 and 8-9) may be written in any combination of one or more programming languages, including, but not limited to, an object-oriented programming language such as Java, Smalltalk, C++, or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
  • These program instructions may also be stored in a computer readable storage medium that can direct a data processing system (e.g., the system 100, the system 700, or the vehicle system controller 901), other programmable data processing apparatus, microcontroller, IP module, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions that implement the functions/acts specified in the flowchart or block diagram block or blocks, or functions represented or exemplified within the schematic diagrams.
  • The program instructions may also be loaded onto a data processing system (e.g., the system 100, the system 700, or the vehicle system controller 901), other programmable data processing apparatus, microcontroller, IP module, or other devices (e.g., via the software interface 108) to cause a series of operational steps to be performed, so as to produce a computer-implemented process such that the instructions that execute on the data processing system, other programmable data processing apparatus, microcontroller, IP module, or other devices provide processes for implementing the functions/acts specified in the flowchart or block diagram block or blocks, or functions represented or exemplified within the schematic diagrams.
  • One or more types of databases may be included in the system 100 (or the system 700, or the vehicle system controller 901) suitable for storing and providing access to data for the various implementations (e.g., for implementing a performance matrix such as described with respect to FIG. 4 or the matrix described with respect to FIG. 8). One skilled in the art will also appreciate that, for security reasons, any databases, systems, or components of the present disclosure may include any combination of databases or components at a single location or at multiple locations, wherein each database or system may include any of various suitable security features, such as firewalls, access codes, encryption, de-encryption and the like. The database may be any type of database, such as relational, hierarchical, object-oriented, or the like. The database (e.g., parameters for determining legitimate and illegitimate PID transitions, or signals for actions taken by the PID transition monitor 107 (e.g., see the process blocks 606 and 607 in FIG. 6)) may be organized in any suitable manner, including as data tables, lookup tables, or state machines.
  • Association of certain data may be accomplished through any data association technique known and practiced in the art (e.g., a lookup table or state machine). For example, the association may be accomplished either manually or automatically. Automatic association techniques may include, for example, a database search, a database merge, GREP, AGREP, SQL, or the like.
  • Aspects of the present disclosure provide a data processing system including a processor, a process identifier unit configured to track process identifier values associated with activities occurring within the processor, and a process identifier transition monitor configured to determine when a transition of the tracked process identifier values from a first value to a second value is illegitimate. The process identifier transition monitor may be configured to output a signal as a function of a determination that the transition of the tracked process identifier values is illegitimate. The process identifier transition monitor may include a lookup table configured to contain entries that indicate which process identifier transitions are legitimate and which are illegitimate. In accordance with certain aspects of the present disclosure, the illegitimate transition of the tracked process identifier values represents an error in an execution of application software in the processor. In accordance with certain aspects of the present disclosure, the illegitimate transition of the tracked process identifier values represents an occurrence of a cyberattack received within the data processing system. In accordance with certain aspects of the present disclosure, the illegitimate transition of the tracked process identifier values represents an unexpected execution in the processor of a certain first thread after execution of a certain second thread. In accordance with certain aspects of the present disclosure, the illegitimate transition of the tracked process identifier values represents an occurrence of a certain activity within the data processing system. In accordance with certain aspects of the present disclosure, the process identifier transition monitor may be configured to capture the first and second values of the tracked process identifier and perform a lookup of the transition in the lookup table to determine whether the transition has been predetermined to be legitimate or illegitimate. In accordance with certain aspects of the present disclosure, the process identifier transition monitor may be configured to select a predetermined response associated with the illegitimate transition, wherein the signal is delivered to a portion of the data processing system as a function of the selected predetermined response. In accordance with certain aspects of the present disclosure, the signal may be configured to cause a vehicle to shut down its drive train. In accordance with certain aspects of the present disclosure, the signal may be configured to cause a warning to be transmitted to a driver or passenger of a vehicle. In accordance with certain aspects of the present disclosure, a legitimate transition of process identifier values represents an expected or acceptable activity occurring within the processor, and an illegitimate transition of process identifier values represents an unexpected, unacceptable, undesirable, unwanted, or erroneous activity occurring within the processor.
  • Aspects of the present disclosure provide a method that includes monitoring a transition of process identifier values, and determining when the transition of process identifier values represents an illegitimate transition of the process identifier values. The method may further include triggering a predetermined response as a function of the determining of the illegitimate transition of the process identifier values. The monitoring of the transition of process identifier values may further include capturing a first process identifier value from a process identifier unit associated with a processor, and capturing a second process identifier value from the process identifier unit, wherein the determining when the transition of process identifier values represents the illegitimate transition of the process identifier values may further include using the first and second process identifier values to perform a lookup in a permission matrix, resulting in the determination that the transition represents the illegitimate transition. In accordance with certain aspects of the present disclosure, the method may further include triggering a predetermined response as a function of the determining of the illegitimate transition of the process identifier values. In accordance with certain aspects of the present disclosure, the predetermined response is a reset of the processor to a predetermined known state. In accordance with certain aspects of the present disclosure, the predetermined response is a signal sent to a vehicle system controller that is configured to perform a specified function in response to the signal. In accordance with certain aspects of the present disclosure, the illegitimate transition represents an occurrence of a certain activity within a data processing system containing the processor. In accordance with certain aspects of the present disclosure, the certain activity is selected from the group consisting of an execution of unexpected software code by the processor, an occurrence of a cyberattack received within the data processing system, a failure of a hardware mechanism external to the processor in the data processing system, and a failure or error occurring in the processor.
  • Aspects of the present disclosure provide a data processing system that includes a processor, a process identifier unit configured to track process identifier values associated with activities occurring within the processor, and a process identifier transition monitor configured to determine whether a transition of the tracked process identifier values from a first value to a second value is legitimate or illegitimate, wherein the process identifier transition monitor further includes circuitry for capturing the first process identifier value from the process identifier unit, circuitry for capturing the second process identifier value from the process identifier unit, circuitry for performing a lookup in a permission matrix configured to contain entries that indicate which transitions of tracked process identifier values are legitimate and which transitions of tracked process identifier values are illegitimate, circuitry for determining from the entries in the permission matrix that the transition of the tracked process identifier values from the first value to the second value represents an illegitimate transition of process identifier values, and circuitry for triggering a predetermined response to the determination that the transition of the tracked process identifier values from the first value to the second value represents an illegitimate transition of process identifier values. In accordance with certain aspects of the present disclosure, the illegitimate transition of the tracked process identifier values may represent the processor entering an unknown or unexpected state of operation. In accordance with certain aspects of the present disclosure, the predetermined response may include resetting the processor to a known state of operation, rebooting the processor, or deactivating the data processing system.
  • Reference may be made herein to a device, circuit, circuitry, system, or module “configured to” perform a particular function or functions. It should be understood that this may include selecting predefined logic blocks and logically associating them, such that they provide particular logic functions, which includes monitoring or control functions. It may also include programming computer software-based logic, wiring discrete hardware components, or a combination of any or all of the foregoing.
  • Reference throughout this specification to “an embodiment,” “embodiments,” “certain embodiments,” “various embodiments,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiments is included in at least one embodiment of the present disclosure. Thus, appearances of the phrases “in embodiments,” “in an embodiment,” “embodiments,” “in certain embodiments,” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment. Furthermore, the described features, structures, aspects, or characteristics of the disclosure may be combined in any suitable manner in one or more embodiments. Correspondingly, even if features may be initially claimed as acting in certain combinations, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination can be directed to a sub-combination or variation of a sub-combination.
  • The terminology used herein is for the purpose of describing particular embodiments and applications only and is not intended to be limiting of the disclosure. In the descriptions herein, numerous specific details are provided, such as examples of activities, circumstances, services, faults, errors, responses, reactions, processor activities, operations, events, mechanisms, software threads, cyberattacks, signals, or actions (e.g., taken by the PID transition monitor 107), programming, software modules, designer, manufacturer, or end user selections (e.g., of legitimate and illegitimate PID transitions), network transactions, database queries, database structures (e.g., see FIGS. 4 and 8), hardware modules, hardware circuits, hardware chips, controllers, etc., to provide a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the disclosure may be practiced without one or more of the specific details, or with other methods, components, materials, activities, circumstances, services, faults, errors, responses, reactions, processor activities, operations, events, mechanisms, software threads, cyberattacks, signals, and so forth. In other instances, well-known structures, materials, or operations may be not shown or described in detail to avoid obscuring aspects of the disclosure.
  • Benefits, advantages, and solutions to problems may have been described herein with regard to specific embodiments or applications (e.g., see FIG. 9). However, the benefits, advantages, solutions to problems, and any element(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as critical, required, or essential features or elements of any or all the claims.
  • Those skilled in the art having read this disclosure will recognize that changes and modifications may be made to the embodiments without departing from the scope of the present disclosure. It should be appreciated that the particular implementations and applications (e.g., see FIG. 9) shown and described herein may be illustrative of the disclosure and are not intended to otherwise limit the scope of the present disclosure in any way. Other variations may be within the scope of the following claims. Headings herein are not intended to limit the disclosure, embodiments of the disclosure, or other matter disclosed under the headings.
  • Herein, the term “or” may be intended to be inclusive, wherein “A or B” includes A or B and also includes both A and B. As used herein, the term “or” when used in the context of a listing of entities, refers to the entities being present singly or in combination. Thus, for example, the phrase “A, B, C, or D” includes A, B, C, and D individually, but also includes any and all combinations and subcombinations of A, B, C, and D. As used herein, the term “and/or” when used in the context of a listing of entities, refers to the entities being present singly or in combination. Thus, for example, the phrase “A, B, C, and/or D” includes A, B, C, and D individually, but also includes any and all combinations and subcombinations of A, B, C, and D.
  • As used herein, the singular forms “a,” “an,” and “the” may be intended to include the plural forms as well, unless the context clearly indicates otherwise.
  • The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims may be intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed.

Claims (20)

What is claimed is:
1. A data processing system comprising:
a processor;
a process identifier unit configured to track process identifier values associated with activities occurring within the processor; and
a process identifier transition monitor configured to determine when a transition of the tracked process identifier values from a first value to a second value is illegitimate.
2. The data processing system as recited in claim 1, further comprising the process identifier transition monitor configured to output a signal as a function of a determination that the transition of the tracked process identifier values is illegitimate.
3. The data processing system as recited in claim 1, wherein the illegitimate transition of the tracked process identifier values represents an occurrence of a certain activity within the data processing system.
4. The data processing system as recited in claim 1, wherein the illegitimate transition of the tracked process identifier values represents an error in an execution of application software in the processor or an occurrence of a cyberattack received within the data processing system.
5. The data processing system as recited in claim 1, wherein the illegitimate transition of the tracked process identifier values represents an unexpected execution in the processor of a certain first thread after execution of a certain second thread.
6. The data processing system as recited in claim 1, wherein the process identifier transition monitor includes a lookup table configured to contain entries that indicate which transitions of tracked process identifier values are legitimate and which transitions of tracked process identifier values are illegitimate.
7. The data processing system as recited in claim 6, wherein the process identifier transition monitor is configured to capture the first and second values of the tracked process identifier and perform a lookup of the transition in the lookup table to determine whether the transition has been predetermined to be legitimate or illegitimate.
8. The data processing system as recited in claim 2, wherein the process identifier transition monitor is configured to select a predetermined response associated with the illegitimate transition, wherein the signal is delivered to a portion of the data processing system as a function of the selected predetermined response.
9. The data processing system as recited in claim 2, wherein the signal is configured to cause a vehicle to shut down its drive train or a warning to be transmitted to a driver or passenger of the vehicle.
10. The data processing system as recited in claim 6, wherein a legitimate transition of process identifier values represents an expected or acceptable activity occurring within the processor, and wherein an illegitimate transition of process identifier values represents an unexpected, unacceptable, undesirable, unwanted, or erroneous activity occurring within the processor.
11. A method comprising:
monitoring a transition of process identifier values tracked within a data processing system; and
determining when the transition of process identifier values represents an illegitimate transition of the process identifier values.
12. The method as recited in claim 11, wherein the monitoring of the transition of process identifier values further comprises:
capturing a first process identifier value from a process identifier unit associated with a processor; and
capturing a second process identifier value from the process identifier unit,
wherein the determining when the transition of process identifier values represents the illegitimate transition of the process identifier values further comprises using the first and second captured process identifier values to perform a lookup in a lookup table, resulting in the determination that the transition of process identifier values represents the illegitimate transition.
13. The method as recited in claim 11, further comprising triggering a predetermined response as a function of the determining of the illegitimate transition of the process identifier values.
14. The method as recited in claim 13, wherein the predetermined response is a reset of the processor to a predetermined known state.
15. The method as recited in claim 13, wherein the predetermined response is a signal sent to a vehicle system controller that is configured to perform a specified function in response to the signal.
16. The method as recited in claim 11, wherein the illegitimate transition represents an occurrence of a certain activity within a processor within the data processing system.
17. The method as recited in claim 16, wherein the certain activity is selected from the group consisting of an execution of unexpected software code by the processor, an occurrence of a cyberattack received within the data processing system, a failure of a hardware mechanism external to the processor in the data processing system, and a failure or error occurring in the processor.
18. A data processing system comprising:
a processor;
a process identifier unit configured to track process identifier values associated with activities occurring within the processor; and
a process identifier transition monitor configured to determine whether a transition of the tracked process identifier values from a first value to a second value is legitimate or illegitimate, wherein the process identifier transition monitor further comprises:
circuitry for capturing the first process identifier value from the process identifier unit;
circuitry for capturing the second process identifier value from the process identifier unit;
circuitry for performing a lookup in a permission matrix configured to contain entries that indicate which transitions of tracked process identifier values are legitimate and which transitions of tracked process identifier values are illegitimate;
circuitry for determining from the entries in the permission matrix that the transition of the tracked process identifier values from the first value to the second value represents an illegitimate transition of process identifier values; and
circuitry for triggering a predetermined response to the determination that the transition of the tracked process identifier values from the first value to the second value represents an illegitimate transition of process identifier values.
19. The data processing system as recited in claim 18, wherein the illegitimate transition of the tracked process identifier values represents the processor entering an unknown or unexpected state of operation.
20. The data processing system as recited in claim 19, wherein the predetermined response is selected from the group consisting of resetting the processor to a known state of operation, rebooting the processor, and deactivating the data processing system.
US15/977,134 2018-05-11 2018-05-11 Process identifier transition monitoring and assessment Abandoned US20190347408A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US15/977,134 US20190347408A1 (en) 2018-05-11 2018-05-11 Process identifier transition monitoring and assessment
US17/523,748 US11675897B2 (en) 2018-05-11 2021-11-10 Process identifier transition monitoring and assessment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US15/977,134 US20190347408A1 (en) 2018-05-11 2018-05-11 Process identifier transition monitoring and assessment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/523,748 Continuation US11675897B2 (en) 2018-05-11 2021-11-10 Process identifier transition monitoring and assessment

Publications (1)

Publication Number Publication Date
US20190347408A1 true US20190347408A1 (en) 2019-11-14

Family

ID=68464676

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/977,134 Abandoned US20190347408A1 (en) 2018-05-11 2018-05-11 Process identifier transition monitoring and assessment
US17/523,748 Active 2038-06-17 US11675897B2 (en) 2018-05-11 2021-11-10 Process identifier transition monitoring and assessment

Family Applications After (1)

Application Number Title Priority Date Filing Date
US17/523,748 Active 2038-06-17 US11675897B2 (en) 2018-05-11 2021-11-10 Process identifier transition monitoring and assessment

Country Status (1)

Country Link
US (2) US20190347408A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180089046A1 (en) * 2014-03-17 2018-03-29 Renesas Electronics Corporation Self-diagnosis device and self-diagnosis method
CN112328514A (en) * 2020-11-12 2021-02-05 深圳中微电科技有限公司 Method and device for generating independent process identification by multithread processor system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150121519A1 (en) * 2013-10-31 2015-04-30 Advanced Micro Devices, Inc. System and method for monitoring and controlling a performance state change
US20160149937A1 (en) * 2014-11-25 2016-05-26 enSilo Ltd. Systems and methods for malicious code detection
US20160304040A1 (en) * 2013-08-22 2016-10-20 Hitachi Automotive Systems, Ltd. Vehicle control device
US20170364792A1 (en) * 2016-06-16 2017-12-21 Sri International Systems and methods for optimizing operations of computing devices using deep neural networks
US20190308589A1 (en) * 2018-04-09 2019-10-10 Cisco Technology, Inc. Vehicle network intrusion detection system (ids) using vehicle state predictions

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8990943B2 (en) * 2009-05-06 2015-03-24 Mcafee, Inc. System, method, and computer program product for identifying a file used to automatically launch content as unwanted
US9747446B1 (en) * 2013-12-26 2017-08-29 Fireeye, Inc. System and method for run-time object classification
US10009374B1 (en) * 2015-08-04 2018-06-26 Symantec Corporation Detecting URL scheme hijacking
US10931637B2 (en) * 2017-09-15 2021-02-23 Palo Alto Networks, Inc. Outbound/inbound lateral traffic punting based on process risk
US10678922B2 (en) * 2017-11-23 2020-06-09 Nicira, Inc. Detecting arbitrary code execution using a hypervisor

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160304040A1 (en) * 2013-08-22 2016-10-20 Hitachi Automotive Systems, Ltd. Vehicle control device
US20150121519A1 (en) * 2013-10-31 2015-04-30 Advanced Micro Devices, Inc. System and method for monitoring and controlling a performance state change
US20160149937A1 (en) * 2014-11-25 2016-05-26 enSilo Ltd. Systems and methods for malicious code detection
US20170364792A1 (en) * 2016-06-16 2017-12-21 Sri International Systems and methods for optimizing operations of computing devices using deep neural networks
US20190308589A1 (en) * 2018-04-09 2019-10-10 Cisco Technology, Inc. Vehicle network intrusion detection system (ids) using vehicle state predictions

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180089046A1 (en) * 2014-03-17 2018-03-29 Renesas Electronics Corporation Self-diagnosis device and self-diagnosis method
CN112328514A (en) * 2020-11-12 2021-02-05 深圳中微电科技有限公司 Method and device for generating independent process identification by multithread processor system

Also Published As

Publication number Publication date
US20220067145A1 (en) 2022-03-03
US11675897B2 (en) 2023-06-13

Similar Documents

Publication Publication Date Title
US11675897B2 (en) Process identifier transition monitoring and assessment
US10824725B2 (en) Automatic detection of software that performs unauthorized privilege escalation
US8726225B2 (en) Testing of a software system using instrumentation at a logging module
US9336122B2 (en) Device having configurable breakpoint based on interrupt status
US10733077B2 (en) Techniques for monitoring errors and system performance using debug trace information
US8495354B2 (en) Apparatus for determining during a power-on sequence, a value to be written to a first register in a secure area and the same value to a second register in non-secure area, which during a protected mode, the value is compared such that if it is equal, enabling writing to a memory
US20120192160A1 (en) Handling breakpoints in an asynchronous debug model
CN109635568B (en) Concurrent vulnerability detection method based on combination of static analysis and fuzzy test
US8752025B2 (en) Protecting breakpoints in a software debugger
Lin et al. A structured approach to post-silicon validation and debug using symbolic quick error detection
CN113946148B (en) MCU chip awakening system based on multi-ECU cooperative control
Singh et al. Logic bug detection and localization using symbolic quick error detection
JP2017151785A (en) Semiconductor device
TW201610672A (en) Debugging in a data processing apparatus
US10387234B2 (en) Apparatus and method for controlling a power supply to processing circuitry to avoid a potential temporary insufficiency in supply of power
US9612279B2 (en) System and method for determining operational robustness of a system on a chip
US20150261979A1 (en) Method for monitoring an arithmetic unit
US9092333B2 (en) Fault isolation with abstracted objects
CN1306411C (en) Device, method and system for processing events in processor
US20200272553A1 (en) Configurable system for interaction with system or processor states in development tools
JPH02294739A (en) Fault detecting system
Yoshimura et al. Can Linux be rejuvenated without reboots?
Fraser et al. Handling model changes: Regression testing and test-suite update with model-checkers
KR101989580B1 (en) Apparatus and method for defensing of code reuse attack
Panjiyar et al. Defending against code injection attacks using Secure Design Pattern

Legal Events

Date Code Title Description
AS Assignment

Owner name: NXP USA, INC., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:REGNER, MARKUS;EBERT, FLORIAN FRANK;SEIBOLD, PETER;SIGNING DATES FROM 20180503 TO 20180507;REEL/FRAME:045778/0610

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STCV Information on status: appeal procedure

Free format text: NOTICE OF APPEAL FILED

STCV Information on status: appeal procedure

Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION