Vulnerability analysis of instructions for SDC-causing error detection

J Gu, W Zheng, Y Zhuang, Q Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
Due to the centralization of communication in the management of data generated by diverse
Internet of Thing (IoT) devices, there is a lack of reliability when data is being transferred and …

SDC-causing error detection based on lightweight vulnerability prediction

C Liu, J Gu, Z Yan, F Zhuang… - Asian Conference on …, 2019 - proceedings.mlr.press
Nowadays the system vulnerability caused by soft errors grows exponentially, of which
Silent Data Corruption (SDC) is one of the most harmful issues due to introducing unnoticed …

Predicting the silent data corruption vulnerability of instructions in programs

N Yang, Y Wang - 2019 IEEE 25th International Conference on …, 2019 - ieeexplore.ieee.org
With the decreasing size and voltage level of internal device components, soft errors are
increasing and constitute a major threat on electronic devices. Silent data corruption (SDC) …

An automated framework for selectively tolerating SDC errors based on rigorous instruction-level vulnerability assessment

HA Ahmad, Y Sedaghat - Future Generation Computer Systems, 2024 - Elsevier
The recent trend in most processor manufacturing technologies has significantly increased
the vulnerability of embedded systems operating in harsh environments against soft errors …

Identifying SDC-causing Instructions based on Random forests algorithm

LP Liu, LL Ci, W Liu, H Yang - KSII Transactions on Internet and …, 2019 - koreascience.kr
Abstract Silent Data Corruptions (SDCs) is a serious reliability issue in many domains of
computer system. The identification and protection of the program instructions that cause …

A methodology to assess output vulnerability factors for detecting silent data corruption

J Ma, Z Duan, L Tang - IEEE Access, 2019 - ieeexplore.ieee.org
As process technology scales, electronic devices become more susceptible to soft error
induced by radiation. Silent data corruption (SDC) is considered the most severe outcome …

Configurable detection of SDC-causing errors in programs

Q Lu, G Li, K Pattabiraman, MS Gupta… - ACM Transactions on …, 2017 - dl.acm.org
Silent Data Corruption (SDC) is a serious reliability issue in many domains, including
embedded systems. However, current protection techniques are brittle and do not allow …

Identify silent data corruption vulnerable instructions using SVM

N Yang, Y Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Silent data corruption (SDC) is the most insidious and harmful result type of soft error.
Identify program vulnerable instructions (PVIns) that are likely to cause SDCs is extremely …

Epipe: a low-cost fault-tolerance technique considering WCET constraints

J Li, J Xue, X Xie, Q Wan, Q Tan, L Tan - Journal of Systems Architecture, 2013 - Elsevier
Transient faults will soon become a critical reliability concern for processors used in
mainstream computing. As the mainstream commodity market accepts only low-cost …

Silent data corruption estimation and mitigation without fault injection

M Yakhchi, M Fazeli, SA Asghari - IEEE Canadian Journal of …, 2022 - ieeexplore.ieee.org
Silent data corruptions (SDCs) have been always regarded as the serious effect of radiation-
induced faults. Traditional solutions based on redundancies are very expensive in terms of …