Abstract
One of the most difficult data flow errors to detect caused by single-event upsets in space radiation is the Silent Data Corruption (SDC). To solve the problem of multi-bit upsets causing program SDC, an instruction multi-bit SDC vulnerability prediction model based on one-class support vector machine classification is built using SDC vulnerability analysis, which has more accurate vulnerability instruction identification capabilities. By hardening the program with selective instruction redundancy, we propose a multi-bit data flow error detection method for detecting SDC error (SDCVA-OCSVM), aiming to protect the data in the memory or register used by the program. We have also verified the effectiveness of the method through comparative experiments. The method has been verified to have a higher error detection rate and lower code size and time overhead.
- [1] . 2012. An efficient technique to tolerate MBU faults in register file of embedded processors. In Proceedings of the 16th CSI International Symposium on Computer Architecture and Digital Systems (CADS’12). IEEE, 115–120.Google ScholarCross Ref
- [2] . 2003. MiniMIPS: A simulation project for the computer architecture laboratory. ACM SIGCSE Bull. 35, 1 (2003), 64–68.Google ScholarDigital Library
- [3] . 2001. Random forests. Machine Learn. 45, 1 (2001), 5–32.Google ScholarDigital Library
- [4] . 2018. Wukong: Explorer of dark matter particles. KEXUE 70, 3 (2018), 18–20.Google Scholar
- [5] . 2019. Multi-bit upsets vulnerability analysis of modern microprocessors. In Proceedings of the IEEE International Symposium on Workload Characterization (IISWC’19). IEEE, 119–130.Google ScholarCross Ref
- [6] . 2016. Reliability on ARM processors against soft errors through SIHFT techniques. IEEE Trans. Nuclear Sci. 63, 4 (2016), 2208–2216.Google Scholar
- [7] . 2016. Characterization of single bit and multiple cell soft error events in planar and FinFET SRAMs. IEEE Trans. Device Mater. Reliabil. 16, 2 (2016), 132–137.Google ScholarCross Ref
- [8] . 2018. An efficient EDAC approach for handling multiple-bit upsets in memory array. Microelectron. Reliabil. 88 (2018), 214–218.Google ScholarCross Ref
- [9] . 2020. Fault detection for turboshaft engine based on local density weighted one-class SVM algorithm. J. Comput. Appl. 40, 3, Article
917 (2020), 917–924.Google Scholar - [10] . 2012. Low-cost program-level detectors for reducing silent data corruptions. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’12). IEEE, 1–12.Google ScholarCross Ref
- [11] . 2012. Relyzer: Exploiting application-level fault equivalence to analyze application resiliency to transient faults. ACM SIGARCH Comput. Arch. News 40, 1 (2012), 123–134.Google ScholarDigital Library
- [12] . 2017. Improving run-time bug detection in aviation software using program slicing. In Proceedings of the IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER’17). IEEE, 1252–1256.Google ScholarCross Ref
- [13] . 1996. Artificial neural networks: A tutorial. Computer 29, 3 (1996), 31–44.Google ScholarDigital Library
- [14] . 2011. Technical support to the national highway traffic safety administration on the reported toyota motor corporation unintended acceleration investigation. NASA Engineering and Safety Center Technical Assessment Report (Jan. 2011).Google Scholar
- [15] . 2019. Identifying sdc-causing instructions based on random forests algorithm. KSII Trans. Internet Info. Syst. 13, 3 (2019), 1566–1582.Google Scholar
- [16] . 2019. A methodology to assess output vulnerability factors for detecting silent data corruption. IEEE Access 7 (2019), 118135–118145.Google ScholarCross Ref
- [17] . 2014. Integrated OCSVM mechanism for intrusion detection in SCADA systems. Electr. Lett. 50, 25 (2014), 1935–1936.Google ScholarCross Ref
- [18] . 2014. Grey wolf optimizer. Adv. Eng. Softw. 69 (2014), 46–61.Google ScholarDigital Library
- [19] . 2016. Modified grey wolf optimizer for global engineering optimization. Appl. Comput. Intell. Soft Comput. 2016 (2016).Google Scholar
- [20] . 1998. Automatic construction of decision trees from data: A multi-disciplinary survey. Data Mining and Knowledge Discovery 2, 4 (1998), 345–389.Google ScholarDigital Library
- [21] . 2010. Soft Errors in Modern Electronic Systems. Vol. 41. Springer Science & Business Media.Google ScholarDigital Library
- [22] . 2002. Error detection by duplicated instructions in super-scalar processors. IEEE Trans. Reliabil. 51, 1 (2002), 63–75.Google ScholarCross Ref
- [23] . 2008. SymPLFIED: Symbolic program-level fault injection and error detection framework. In Proceedings of the IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN’08). IEEE, 472–481.Google ScholarCross Ref
- [24] . 2011. Single-event Effects in Aerospace. John Wiley & Sons.Google ScholarCross Ref
- [25] . 2005. SWIFT: Software implemented fault tolerance. In Proceedings of the International Symposium on Code Generation and Optimization. IEEE, 243–254.Google ScholarDigital Library
- [26] . 2018. GPU-Accelerated Soft Error Rate Analysis of Large-Scale Integrated Circuits. IEEE Design Test 35, 6 (2018), 78–85.Google ScholarCross Ref
- [27] . 2017. Online soft-error vulnerability estimation for memory arrays and logic cores. IEEE Trans. Comput.-Aided Design Integr. Circ. Syst. 37, 2 (2017), 499–511.Google ScholarDigital Library
- [28] . 2018. Neural network based silent error detector. In Proceedings of the IEEE International Conference on Cluster Computing (CLUSTER’18). IEEE, 168–178.Google ScholarCross Ref
- [29] . 2019. Power system anomaly detection based on OCSVM optimized by improved particle swarm optimization. IEEE Access 7 (2019), 181580–181588.Google ScholarCross Ref
- [30] . 2012. Understanding soft error propagation using efficient vulnerability-driven fault injection. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’12). IEEE, 1–12.Google Scholar
- [31] . 2019. Identify silent data corruption vulnerable instructions using SVM. IEEE Access 7 (2019), 40210–40219.Google ScholarCross Ref
- [32] . 2007. Error flow model: Modeling and analysis of software propagating hardware faults. Ruan Jian Xue Bao (J. Softw.) 18, 4 (2007), 808–820.Google Scholar
- [33] . 2019. “Space rescue”: A chronicle of China’s faulty satellite rescue. Yanhuang Chunqiu 09 (2019), 19–23.Google Scholar
- [34] . 2018. Improved grey wolf optimizer for the TFT-LCD module assembly scheduling problem. J. Chinese Comput. Syst. 39, 10, Article
2146 (2018), 7 pages.Google Scholar - [35] . 2012. Multiple-bit-upset and single-bit-upset resilient 8T SRAM bitcell layout with divided wordline structure. IEICE Trans. Electron. 95, 10 (2012), 1675–1681.Google ScholarCross Ref
Index Terms
- Multi-bit Data Flow Error Detection Method Based on SDC Vulnerability Analysis
Recommendations
A Novel Concurrent Error Detection Scheme for FFT Networks
The algorithm-based fault tolerance techniques have been proposed to obtain reliableresults at very low hardware overhead. Even though 100% fault coverage can betheoretically obtained by using these techniques, the system performance, i.e., ...
BCH 2-Bit and 3-Bit Error Correction with Fast Multi-Bit Error Detection
Architecture of Computing SystemsAbstractIn this paper an new approach combining 2-bit and 3-bit BCH error correction with fast and simple error detection for errors of higher order is presented. Under the assumption that a 2-bit error or 3-bit error occurred, the corresponding ...
Bit-Flip Aware Control-Flow Error Detection
PDP '15: Proceedings of the 2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based ProcessingRecent increase of transient fault rates has made processor reliability a major concern. Moreover performance improvements are required for many of today's embedded systems. At the same time software implemented fault detection remains the only option ...
Comments