2002
DOI: 10.1109/24.994913
|View full text |Cite
|
Sign up to set email alerts
|

Error detection by duplicated instructions in super-scalar processors

Abstract: This paper proposes a pure software technique, Error Detection by Duplicated Instructions (EDDI), for detecting errors during normal system operation. Compared to other error detection techniques that use hardware redundancy, our method does not require any hardware modifications to add error detection capability to the original system. In EDDI, we duplicate instructions during compilation and use different registers and variables for the new instructions. Especially for the fault in the code segment of memory… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
226
0
1

Year Published

2009
2009
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 463 publications
(227 citation statements)
references
References 23 publications
0
226
0
1
Order By: Relevance
“…The so-called Software Implemented Hardware Fault Tolerance (SIHFT ) [25] techniques can be divided in two main categories according to the type of error they pretend to detect/correct: errors that may affect the control flow execution [26]; or errors that may affect the program data [27].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The so-called Software Implemented Hardware Fault Tolerance (SIHFT ) [25] techniques can be divided in two main categories according to the type of error they pretend to detect/correct: errors that may affect the control flow execution [26]; or errors that may affect the program data [27].…”
Section: Related Workmentioning
confidence: 99%
“…Some examples of these include ControlFlow Checking by Software Signatures (CFCSS ) [26], Assertions for Control Flow Checking (ACFC ) [28], Yet Another Control flow Checking Approach (YACCA) [29], and Control-flow Error Detection through Assertions (CEDA) [30]. Moreover, those approaches included in the second group are mainly based on the N-versions programming approach [31], which can be applied at different granularity levels: program [11,32], procedure [33], and the most commonly used, instruction level [27,[34][35][36].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…EDDI [4] duplicates instructions and memory in the compiled form of an application in a manner similar to the source-to-source transformations, but achieves more support for programming constructs at the cost of platform dependence. Unlike the source-to-source transformations, EDDI compiles applications to binary form, redundantly executes all calculations, ensures separation between calculations by using differing memory addresses and differing registers, and attempts to order instructions to exploit super-scalar processor capabilities.…”
Section: Related Workmentioning
confidence: 99%