Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication

Moslem Didehban, Hwisoo So, Prudhvi Gali, Aviral Shrivastava, Kyoungwoo Lee

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Transient faults or soft errors are considered one of the most daunting reliability challenges for microprocessors. Software solutions for soft error protection are attractive because they can provide flexible and effective error protection. For instance, nZDC (Didehban and Shrivastava 2016) state-of-The-Art instruction duplication error protection scheme achieves a high degree of error detection by verifying the results of memory write operations and utilizes an effective control-flow checking mechanism. However, nZDC control-flow checking mechanism is architecture-dependent and suffers from some vulnerability holes. In this work, we address these issues by substituting nZDC control-flow checking mechanism with a general (ISA-independent) scheme and propose two transformations, coarse-grained scheduling, and asymmetric control-flow signatures, for hard-To-detect control flow errors. Fault injection experiments on different hardware components of synthesizable Verilog description of an OpenRISC-based microprocessor reveal that the proposed transformation shows 85% less silent data corruptions compared to nZDC. In addition, programs protected by the proposed scheme run on average around 37% faster than nZDC-protected programs.

Original languageEnglish (US)
Article number3245842
Pages (from-to)78-92
Number of pages15
JournalIEEE Transactions on Dependable and Secure Computing
Volume21
Issue number1
DOIs
StatePublished - Jan 1 2024

Keywords

  • Compiler
  • reliability
  • silent data corruption
  • soft errors
  • transient faults

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • General Computer Science

Fingerprint

Dive into the research topics of 'Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication'. Together they form a unique fingerprint.

Cite this