2013
DOI: 10.1145/2400682.2400707
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic code duplication with vulnerability awareness for soft error detection on VLIW architectures

Abstract: Soft errors are becoming a critical concern in embedded system designs. Code duplication techniques have been proposed to increase the reliability in multi-issue embedded systems such as VLIW by exploiting empty slots for duplicated instructions. However, they increase code size, another important concern, and ignore vulnerability differences in instructions, causing unnecessary or inefficient protection when selecting instructions to be duplicated under constraints. In this article, we propose a compiler-assi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 41 publications
0
9
0
Order By: Relevance
“…How-ever, complete duplication of all instructions can incur severe overhead in terms of energy and performance due to a large number of instructions. In order to reduce the overhead from software-only protections, Hu et al [19], Lee et al [20], and Sartor et al [31] proposed a VLIW scheduling algorithm by exploiting unused instruction slots with minimal hardware modules such as register queues and comparator. Their approaches can schedule the original instructions and its duplicated instructions with considering performance or energy boundary.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…How-ever, complete duplication of all instructions can incur severe overhead in terms of energy and performance due to a large number of instructions. In order to reduce the overhead from software-only protections, Hu et al [19], Lee et al [20], and Sartor et al [31] proposed a VLIW scheduling algorithm by exploiting unused instruction slots with minimal hardware modules such as register queues and comparator. Their approaches can schedule the original instructions and its duplicated instructions with considering performance or energy boundary.…”
Section: Related Workmentioning
confidence: 99%
“…If they are not identical, it is defined as soft errors on the datapath. Note that we have modified ISA [20] to recognize whether an instruction is or not. If an instruction is not duplicated, our architecture skips the comparison process.…”
Section: Enhanced Vliw Architecture For Error Protectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Memory-based HA is also considered a part of the entire system's HA. Redundancy has been applied at different levels of granularity, such as the hardware, thread, and instruction levels [36]. SWIFT, a software-only fault-detection technique, duplicates a program's instructions, inserting explicit validation codes to compare the results of original instructions and their corresponding duplicates [37].…”
Section: B Checkpoint Solution For Hypervisormentioning
confidence: 99%
“…In order to direct the level of high reliability, PROFIT [39] adjusts the level of protection and performance at fine granularities based on SWIFT. However, SWIFT incurs unwanted performance overhead as the number of instructions can be easily doubled, mainly due to the full duplication of instructions [36].…”
Section: B Checkpoint Solution For Hypervisormentioning
confidence: 99%