2019
DOI: 10.1109/access.2019.2905842
|View full text |Cite
|
Sign up to set email alerts
|

Identify Silent Data Corruption Vulnerable Instructions Using SVM

Abstract: Silent data corruption (SDC) is the most insidious and harmful result type of soft error. Identify program vulnerable instructions (PVIns) that are likely to cause SDCs is extremely significant on selective software-based protection techniques. However, current identification techniques require tremendous fault injections or have non-negligible differences in performance among different programs as well as different program inputs. This paper proposes PVInsiden to reduce the cost of fault injection and improve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…The proposed method is compared with other methods to accomplish its algorithm verification, which further illustrates the effectiveness and scalability of the proposed method. The regression algorithms involved in the comparison include logistic regression [37], SVM [38][39], random forest [40][41], SGD and the proposed method. The constructed model is shown in Fig.…”
Section: F Methods Comparison and Verificationmentioning
confidence: 99%
“…The proposed method is compared with other methods to accomplish its algorithm verification, which further illustrates the effectiveness and scalability of the proposed method. The regression algorithms involved in the comparison include logistic regression [37], SVM [38][39], random forest [40][41], SGD and the proposed method. The constructed model is shown in Fig.…”
Section: F Methods Comparison and Verificationmentioning
confidence: 99%
“…Xu et al proposed a biased injection framework called Critical Fault to remove benign faults by the instruction-level vulnerability analysis [20]. Yang N et al proposed a method called Program Vulnerable Instructions Identification (PVInsiden) to identify program vulnerable instructions that were likely to cause SDCs [9]. Wang C et al proposed a neural network detector which could find out the SDC errors [10] iterated many times in the program.…”
Section: Related Workmentioning
confidence: 99%
“…p i is the vulnerability of the i th sample which is calculated during the fault injection phase. Then, we can obtain the vulnerability function prediction basec on SVR and shown in equation (9).…”
Section: ) Instruction Sdc Vulnerability Prediction Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Crash and hang are explicit errors that cause programs to respectively stop execution and to run non-stop, and they can be easily captured by those explicit behaviours. Being benign means that an error is masked during the program execution and does not have an effect on the output of the program [4]. SDC means that an error does not incur explicit behaviours; however, an incorrect result is produced after the program finishes.…”
Section: Introductionmentioning
confidence: 99%