Abstract: Considering we are handling identical systems of homogeneous computer architecture, the security of such computer structures also takes priority, and thus, we are here to help pay attention ...