2010
DOI: 10.1145/1755951.1755910
|View full text |Cite
|
Sign up to set email alerts
|

Cache vulnerability equations for protecting data in embedded processor caches from soft errors

Abstract: Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, caches are most vulnerable to soft errors, and techniques at various levels of design abstraction, e.g., fabrication, gate design, circuit design, and microarchitecture-level, have been developed to protect data in caches. However, no work has been done to investigate the effect of code transformations on the vulnerability of data in cac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…Similarly, code transformations such as loop interchange and loop fusion, data layout transformations such as array placement and interleaving change the read/write pattern of variables in the cache. Some researchers study these interactions in detail [38,61,79,89] and show that by carefully selecting the compiler optimizations, a fine balance between performance and reliability can be obtained.…”
Section: Compiler Based Techniquesmentioning
confidence: 99%
“…Similarly, code transformations such as loop interchange and loop fusion, data layout transformations such as array placement and interleaving change the read/write pattern of variables in the cache. Some researchers study these interactions in detail [38,61,79,89] and show that by carefully selecting the compiler optimizations, a fine balance between performance and reliability can be obtained.…”
Section: Compiler Based Techniquesmentioning
confidence: 99%
“…Solutions to increase the reliability of a system, in the presence of soft errors, hae been sought after at all levels of computer design abstraction e.g., chip packaging [9], device fabrication [10], circuit design [11], computer microarchitecture [12], compiler optimizations [13] and software design [14]. Though the techniques had been developed for single-processor systems, they could be made applicable to many-core systems; however the performance or hardware overhead in each would be multiplied by the number of cores it is applied to.…”
Section: Related Workmentioning
confidence: 99%
“…Different methods to enhance the soft-error resilience of multi-core systems with regard to soft-errors have been already proposed at all levels of design hierarchy, including packaging level [Bau95], fabrication level [Can04], circuit design [Roc92] as well as software level [Shr10].…”
Section: State-of-the-art Methodsmentioning
confidence: 99%