Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1266366.1266681acmconferencesArticle/Chapter ViewAbstractPublication PagesdateConference Proceedingsconference-collections
Article

Verification-guided soft error resilience

Published: 16 April 2007 Publication History

Abstract

Algorithmic techniques for formal verification can be used not just for bug-finding, but also to estimate vulnerability to reliability problems and to reduce overheads of circuit mechanisms for error resilience. We demonstrate this idea of verification-guided error resilience in the context of soft errors in latches. We show how model checking can be used to identify latches in a circuit that must be protected in order that the circuit satisfies a formal specification. Experimental results on a Verilog implementation of the ESA SpaceWire communication protocol indicate that the power overhead of soft error protection can be reduced by a factor of 4.35 by using our approach rather than protecting all latches.

References

[1]
Cadence SMV model checker. http://www.kenmcmil.com/smv.html.
[2]
SpaceWire Verilog. http://www.opencores.org/projects.cgi/web/spacewire/overview, July 2005.
[3]
IEEE P1850 - standard for PSL - property specification language. http://www.eda.org/ieee-1850/, URL circa Sep.'06.
[4]
H. Asadi and M. B. Tahoori. Soft error modeling and protection for sequential elements. In Proc. of the IEEE Intl. Symp. On Defect and Fault Tolerance in VLSI Systems (DFT), pages 463--471, October 2005.
[5]
R. C. Baumann. The impact of technology scaling on soft error rate performance and limits to the efficiency of error correction. In Proc. IEDM, pages 329--332, 2002.
[6]
H. Chockler, O. Kupferman, and M. Y. Vardi. Coverage metrics for formal verification. In Proc. CHARME, LNCS 2860, pages 111--125, 2003.
[7]
E. M. Clarke, O. Grumberg, and D. A. Peled. Model Checking. MIT Press, 2000.
[8]
European Cooperation for Space Standardization. Space engineering - SpaceWire - links, nodes, routers, and networks (draft ECSS-E-50-12A). http://www.spacewire.esa.int/tech/spacewire/standards/, November 2002.
[9]
K. Goswami, R. Iyer, and L. Young. DEPEND: a simulation-based environment for system-level dependability analysis. IEEE Trans. Computers, pages 60--74, Jan. 1997.
[10]
Y. V. Hoskote, T. Kam, P.-H. Ho, and X. Zhao. Coverage estimation for symbolic model checking. In Design Automation Conference (DAC), pages 300--305, 1999.
[11]
M. Hsueh, T. Tsai, and R. Iyer. Fault injection techniques and tools. IEEE Computer, pages 75--82, April 1997.
[12]
G. A. Kanawati, N. A. Kanawati, and J. A. Abraham. FERRARI: A flexible software-based fault and error injection system. IEEE Trans. on Computers, 44(2):248--260, 1995.
[13]
U. Krautz, M. Pflanz, C. Jacobi, H. W. Tast, K. Weber, and H. T. Vierhaus. Evaluating coverage of error detection logic for soft errors using formal methods. In Proc. DATE 2006, pages 176--181, 2006.
[14]
S. Krishnaswamy, G. F. Viamontes, I. L. Markov, and J. P. Hayes. Accurate reliablity evaluation and enhancement via probabilistic transfer matrices. In Proc. Design Automation and Test in Europe (DATE), pages 282--287, 2005.
[15]
K. L. McMillan. Symbolic Model Checking. Kluwer Academic Publishers, 1992.
[16]
S. Mitra, T. Karnik, N. Seifert, and M. Zhang. Logic soft errors in sub-65nm technologies design and CAD challenges. In Design Automation Conference (DAC), pages 2--4, 2005.
[17]
M. Nicolaidis. Design for soft error mitigation. IEEE Trans. Device and Matl. Reliability, 5(3):405--418, Sept. 2005.
[18]
S. S. Mukherjee et al. A systematic methodology to compute the architectural vulnerability factors for a high-performance microprocessor. In Proc. Int'l Symp. Microarchitecture (MICRO), pages 29--40, 2003.
[19]
N. J. Wang, J. Quek, T. M. Rafacz, and S. J. Patel. Characterizing the effects of transient faults on a high-performance processor pipeline. In Proc. Int'l Conf. Dependable Systems and Networks (DSN), pages 61--70. IEEE Press, 2004.
[20]
M. Zhang, S. Mitra, T. M. Mak, N. Seifert, Q. Shi, K. Kim, N. Shanbhag, N. Wang, and S. Patel. Sequential element design with built-in soft error resilience. IEEE Transactions on VLSI, Dec. 2006.

Cited By

View all
  • (2019)Probabilistic Evaluation of Hardware Security VulnerabilitiesACM Transactions on Design Automation of Electronic Systems10.1145/329040524:2(1-20)Online publication date: 10-Jan-2019
  • (2016)Processor Design for Soft ErrorsACM Computing Surveys10.1145/299635749:3(1-44)Online publication date: 8-Nov-2016
  • (2016)Invited - Cross-layer approaches for soft error modeling and mitigationProceedings of the 53rd Annual Design Automation Conference10.1145/2897937.2905007(1-6)Online publication date: 5-Jun-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DATE '07: Proceedings of the conference on Design, automation and test in Europe
April 2007
1741 pages
ISBN:9783981080124

Sponsors

Publisher

EDA Consortium

San Jose, CA, United States

Publication History

Published: 16 April 2007

Check for updates

Qualifiers

  • Article

Conference

DATE07
Sponsor:
  • EDAA
  • SIGDA
  • The Russian Academy of Sciences
DATE07: Design, Automation and Test in Europe
April 16 - 20, 2007
Nice, France

Acceptance Rates

Overall Acceptance Rate 518 of 1,794 submissions, 29%

Upcoming Conference

DATE '25
Design, Automation and Test in Europe
March 31 - April 2, 2025
Lyon , France

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Probabilistic Evaluation of Hardware Security VulnerabilitiesACM Transactions on Design Automation of Electronic Systems10.1145/329040524:2(1-20)Online publication date: 10-Jan-2019
  • (2016)Processor Design for Soft ErrorsACM Computing Surveys10.1145/299635749:3(1-44)Online publication date: 8-Nov-2016
  • (2016)Invited - Cross-layer approaches for soft error modeling and mitigationProceedings of the 53rd Annual Design Automation Conference10.1145/2897937.2905007(1-6)Online publication date: 5-Jun-2016
  • (2016)Reliability-Aware Resource Allocation and Binding in High-Level SynthesisACM Transactions on Design Automation of Electronic Systems10.1145/283930021:2(1-27)Online publication date: 28-Jan-2016
  • (2015)Formal Quantification of the Register Vulnerabilities to Soft Error in RTL Control PathsJournal of Electronic Testing: Theory and Applications10.1007/s10836-015-5519-331:2(193-206)Online publication date: 1-Apr-2015
  • (2014)Automated detection and verification of parity-protected memory elementsProceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design10.5555/2691365.2691367(1-8)Online publication date: 3-Nov-2014
  • (2014)Verification-guided voter minimization in triple-modular redundant circuitsProceedings of the conference on Design, Automation & Test in Europe10.5555/2616606.2616719(1-6)Online publication date: 24-Mar-2014
  • (2014)On-chip sensor networks for soft-error tolerant real-time multiprocessor systems-on-chipACM Journal on Emerging Technologies in Computing Systems10.1145/256492810:2(1-20)Online publication date: 6-Mar-2014
  • (2013)Reliability challenges for electric vehiclesProceedings of the 50th Annual Design Automation Conference10.1145/2463209.2488855(1-9)Online publication date: 29-May-2013
  • (2011)Towards robustness analysis using PVSProceedings of the Second international conference on Interactive theorem proving10.5555/2033939.2033949(71-86)Online publication date: 22-Aug-2011
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media