Proceedings of the Fifth ACM/IEEE International Symposium on Networks-on-Chip 2011
DOI: 10.1145/1999946.1999965
|View full text |Cite
|
Sign up to set email alerts
|

A distributed and topology-agnostic approach for on-line NoC testing

Abstract: A new distributed on-line test mechanism for NoCs is proposed which scales to large-scale networks with general topologies and routing algorithms. Each router and its links are tested using neighbors in different phases. Only the router under test is in test mode and all other parts of the NoC are in functional mode.Experimental results show that our on-line test approach can detect stuck-at and short-wire faults in the routers and links. Our approach achieves 100% fault coverage for the data-path and 85% for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(13 citation statements)
references
References 22 publications
0
13
0
Order By: Relevance
“…Designing and defending against HTs in a chip has been a hot research topic [2,3,4,1,5,6]. Various HTs and countermeasures have been proposed [2,7,8,9,10,11,12]. A typical HT is made of the trigger, the Trojan circuit and the payload [1].…”
Section: Hardware Trojansmentioning
confidence: 99%
“…Designing and defending against HTs in a chip has been a hot research topic [2,3,4,1,5,6]. Various HTs and countermeasures have been proposed [2,7,8,9,10,11,12]. A typical HT is made of the trigger, the Trojan circuit and the payload [1].…”
Section: Hardware Trojansmentioning
confidence: 99%
“…Similar to scouting packets, a common method used for fault detection is the broadcasting of test vectors, either during boot-up [Strano et al 2011;Hosseinabady et al 2007] or at runtime. In order to mitigate the performance degradation caused by testing interruptions, token-based mechanisms have been explored [Kakoee et al 2011a[Kakoee et al , 2014 as well as hardware for monitoring specific modules, such as the router arbiters or datapath components [Seitanidis et al 2014]. A well-established technique to the problem of compromised/corrupted transmission of packets between routers is the use of Error Detecting/Correcting Codes (EDC/ECC).…”
Section: Detection/localizationmentioning
confidence: 99%
“…The BIST process may be executed by the manufacturer prior to shipment, or it may constitute part of system boot-up [Strano et al 2011;Hosseinabady et al 2007]. Runtime BIST is also possible, but system operation is (partially) halted while the module under test is examined [Fick et al 2009b;Kakoee et al 2011a].…”
Section: Introductionmentioning
confidence: 99%
“…Please note that, fault diagnosis is out of scope of this paper. We assume that in the network a hardware [20] [21] or software [22] diagnosis mechanism exists to detect faults. We further assume that the availability of a channel c i,j = (U 0,i , U 0,j ) is signaled by availability signal κ i,j that leads in the reverse direction of the channel, i.e.…”
Section: Recalculation Of Routingmentioning
confidence: 99%