Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Static Analysis of Register File Vulnerability

Published: 01 April 2011 Publication History

Abstract

With continuous technology scaling, soft errors are becoming an increasingly important design concern even for earth-bound applications. While compiler approaches have the potential to mitigate the effect of soft errors with minimal runtime overheads, static vulnerability estimation-an essential part of compiler approaches-is lacking due to its inherent complexity. This paper presents a static analysis approach for register file (RF) vulnerability estimation. We decompose the vulnerability of a register into intrinsic and conditional basic-block vulnerabilities. This decomposition allows us to develop a fast, yet reasonably accurate RF vulnerability estimation mechanism. We validate and compare a linear equation based method and an iterative method. Also we demonstrate a practical application of RF vulnerability estimation to compiler optimizations. Our experimental results on benchmarks from MiBench suite indicate that not only our static RF vulnerability estimation is fast and accurate, but also compiler optimizations enabled by our static estimation can achieve very cost-effective protection of register files against soft errors.

Cited By

View all
  • (2018)Dynamic Self-modifying Code Detection Based on Backward AnalysisProceedings of the 2018 10th International Conference on Computer and Automation Engineering10.1145/3192975.3193016(199-204)Online publication date: 24-Feb-2018
  • (2016)Reliability-Aware Resource Allocation and Binding in High-Level SynthesisACM Transactions on Design Automation of Electronic Systems10.1145/283930021:2(1-27)Online publication date: 28-Jan-2016
  • (2015)A Joint SW/HW Approach for Reducing Register File VulnerabilityACM Transactions on Architecture and Code Optimization10.1145/273337812:2(1-28)Online publication date: 11-May-2015
  • Show More Cited By

Index Terms

  1. Static Analysis of Register File Vulnerability
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
    IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  Volume 30, Issue 4
    April 2011
    163 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 April 2011

    Author Tags

    1. Architectural vulnerability factor
    2. compilers
    3. embedded systems
    4. partially protected register file
    5. soft error
    6. static analysis

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Dynamic Self-modifying Code Detection Based on Backward AnalysisProceedings of the 2018 10th International Conference on Computer and Automation Engineering10.1145/3192975.3193016(199-204)Online publication date: 24-Feb-2018
    • (2016)Reliability-Aware Resource Allocation and Binding in High-Level SynthesisACM Transactions on Design Automation of Electronic Systems10.1145/283930021:2(1-27)Online publication date: 28-Jan-2016
    • (2015)A Joint SW/HW Approach for Reducing Register File VulnerabilityACM Transactions on Architecture and Code Optimization10.1145/273337812:2(1-28)Online publication date: 11-May-2015
    • (2015)Application-Based Analysis of Register File Criticality for Reliability Assessment in Embedded MicroprocessorsJournal of Electronic Testing: Theory and Applications10.1007/s10836-015-5513-931:2(139-150)Online publication date: 1-Apr-2015
    • (2014)Reliability-aware Register Binding for Control-Flow Intensive DesignsProceedings of the 51st Annual Design Automation Conference10.1145/2593069.2593200(1-6)Online publication date: 1-Jun-2014
    • (2013)Accurate and efficient reliability estimation techniques during ADL-driven embedded processor designProceedings of the Conference on Design, Automation and Test in Europe10.5555/2485288.2485423(547-552)Online publication date: 18-Mar-2013
    • (2013)Software-based register file vulnerability reduction for embedded processorsACM Transactions on Embedded Computing Systems10.1145/2536747.253676013:1s(1-20)Online publication date: 6-Dec-2013
    • (2012)Application-specific power-efficient approach for reducing register file vulnerabilityProceedings of the Conference on Design, Automation and Test in Europe10.5555/2492708.2492851(574-577)Online publication date: 12-Mar-2012

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media