2007
DOI: 10.1109/vts.2007.49
|View full text |Cite
|
Sign up to set email alerts
|

Power Virus Generation Using Behavioral Models of Circuits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…For instance, if we know that a particular part of the system is vulnerable to subtle failures, an SLT workload that stresses this part of the system will be useful. This is related to the "power-virus" generation considered (for much smaller circuits) in the past [27].…”
Section: Slt Program Generationmentioning
confidence: 99%
“…For instance, if we know that a particular part of the system is vulnerable to subtle failures, an SLT workload that stresses this part of the system will be useful. This is related to the "power-virus" generation considered (for much smaller circuits) in the past [27].…”
Section: Slt Program Generationmentioning
confidence: 99%
“…The technique is also functionally valid at the processor level. Najeeb et al [34] propose a technique that converts a circuit behavioral model to an integer constraint model and employs an integer constraint solver to generate a power virus that can be used to estimate the peak power of the processor. To the best of our knowledge, no prior work exists on determining application-specific peak power for a processor based on symbolic simulation.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the generated sequence will result in an unrealistic estimation [12]. The techniques presented in [13] and [14] attempt to find the assembly instructions for determining the peak power, but neither do they perform a full-chip power distribution network simulation, nor do they consider the resistance of conductors and the location of power pads. The authors of [15] and [16] propose methods to generate the input patterns to maximize the high-frequency supply noise (noise frequency S clock frequency).…”
Section: Introductionmentioning
confidence: 99%