2016
DOI: 10.1016/j.micpro.2016.01.012
|View full text |Cite
|
Sign up to set email alerts
|

Fast and accurate architectural vulnerability analysis for embedded processors using Instruction Vulnerability Factor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Existing studies [7], [8] have introduced metrics to help evaluate the impact of errors by formulating vulnerability metrics, such as the application vulnerability factor (AVF). However, such metrics rely on exhaustive error-injection campaigns that use single bit-flip models.…”
Section: Error Modelling and Error Vulnerability Estimationmentioning
confidence: 99%
See 2 more Smart Citations
“…Existing studies [7], [8] have introduced metrics to help evaluate the impact of errors by formulating vulnerability metrics, such as the application vulnerability factor (AVF). However, such metrics rely on exhaustive error-injection campaigns that use single bit-flip models.…”
Section: Error Modelling and Error Vulnerability Estimationmentioning
confidence: 99%
“…Nevertheless, these models have neglected some important microarchitecture features and were not used to estimate the susceptibility of any code to timing errors early at the design cycle to help designers choose appropriate design options. Only few existing studies tried to estimate the vulnerability of applications to errors by evaluating different metrics [7], [8]. Typically, such metrics are leveraged to evaluate either the impact of errors on applications or their reliability.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Azarpeyvand et al [19] introduce the metric instruction vulnerability factor to quantify software vulnerability (extending the PVF metric) by also considering the microarchitecture details of the processor. In this, a custom fault-injection framework is used to analyze the impact of transient faults on the instruction set.…”
Section: B Related Workmentioning
confidence: 99%