2007
DOI: 10.1145/1273442.1250741
|View full text |Cite
|
Sign up to set email alerts
|

Fault-tolerant typed assembly language

Abstract: A transient hardware fault occurs when an energetic particle strikes a transistor, causing it to change state. Although transient faults do not permanently damage the hardware, they may corrupt computations by altering stored values and signal transfers. In this paper, we propose a new scheme for provably safe and reliable computing in the presence of transient hardware faults. In our scheme, software computations are replicated to provide redundancy while special instructions compare the independently compute… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0
6

Year Published

2008
2008
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(21 citation statements)
references
References 28 publications
0
15
0
6
Order By: Relevance
“…A recent paper [8] proposes the use of typechecking to verify the fault-tolerance provided by a specific error detection mechanism, namely, compilerbased instruction duplication. The paper proposes a detailed machine model for executing programs.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A recent paper [8] proposes the use of typechecking to verify the fault-tolerance provided by a specific error detection mechanism, namely, compilerbased instruction duplication. The paper proposes a detailed machine model for executing programs.…”
Section: Related Workmentioning
confidence: 99%
“…However, the detection mechanism (duplication) is tightly coupled with the machine model, due to inherent assumptions that limit error propagation in the program and may not hold in non-duplicated programs. Further, the type-checking technique in [8] either accepts or rej ects a program based on whether the program has been duplicated correctly, but it does not consider the consequences of the error on the program. As a result, the program may be rejected by the technique even though the error is benign and has no effect on the program's output.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To prevent out-ofbounds memory accesses that may occur as a consequence of an unreliable array index computation, Rely requires that each array read and write includes a bounds check; these bounds check computations also execute reliably. Rely does not require a specific underlying mechanism to execute these operations reliably; one can use any applicable software or hardware technique [20,26,28,51,53,57,66,70].…”
Section: Relymentioning
confidence: 99%
“…However, aggressively pursuing these design goals can often increase the frequency of soft errors in small [67] and large systems [10] alike. Researchers have developed numerous techniques for detecting and masking soft errors in both hardware [23] and software [20,53,57,64]. These techniques typically come at the price of increased execution time, increased energy consumption, or both.…”
Section: Introductionmentioning
confidence: 99%