2012 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2012
DOI: 10.1109/date.2012.6176535
|View full text |Cite
|
Sign up to set email alerts
|

Application-specific power-efficient approach for reducing register file vulnerability

Abstract: This paper introduces a power efficient approach for improving reliability of heterogeneous register files in embedded processors. The approach is based on the fact that control applications have high demands in reliability, while many special-purpose register are unused in a considerable portion of execution. The paper proposes a static application binary analysis which is applied at function-level granularity and offers a systematic way to manage the RF's protection by mirroring the content of used registers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…Functions provide well-known isolation over register accesses in the program code, simplifying tracking register dependencies across different function calls. Further details have been provided in [9].…”
Section: A Register-mirroring Trade-offsmentioning
confidence: 99%
See 3 more Smart Citations
“…Functions provide well-known isolation over register accesses in the program code, simplifying tracking register dependencies across different function calls. Further details have been provided in [9].…”
Section: A Register-mirroring Trade-offsmentioning
confidence: 99%
“…In the Blackfin ISA, we chose to extend the the Link/Unlink instructions, as the code size overhead is lower when embedding the MR push and pop operations to the current instructions. Deep analysis has been provided in [9]. Further details of application binary analysis has been provided in [9].…”
Section: Application Analysis and Instrumentationmentioning
confidence: 99%
See 2 more Smart Citations
“…Tankhi et al determines and analyses an application's RVF for embedded processors using a power e cient approach [51]. Li et al develops a novel methodology and analysis tool to determine the e ect of soft errors on extreme-scale scientific applications [52].…”
Section: Zhang Et Al Analyzes Application Vulnerability For Simultanmentioning
confidence: 99%