Protecting caches from soft errors: A microarchitect's perspective

Yohan Ko, Reiley Jeyapaul, Youngbin Kim, Kyoungwoo Lee, Aviral Shrivastava

Research output: Contribution to journalReview articlepeer-review

9 Scopus citations

Abstract

Soft error is one of the most important design concerns in modern embedded systems with aggressive technology scaling. Among various microarchitectural components in a processor, cache is the most susceptible component to soft errors. Error detection and correction codes are common protection techniques for cache memory due to their design simplicity. In order to design effective protection techniques for caches, it is important to quantitatively estimate the susceptibility of caches without and even with protections. At the architectural level, vulnerability is the metric to quantify the susceptibility of data in caches. However, existing tools and techniques calculate the vulnerability of data in caches through coarse-grained block-level estimation. Further, they ignore common cache protection techniques such as error detection and correction codes. In this article, we demonstrate that our word-level vulnerability estimation is accurate through intensive fault injection campaigns as compared to block-level one. Further, our extensive experiments over benchmark suites reveal several counter-intuitive and interesting results. Parity checking when performed over just reads provides reliable and power-efficient protection than that when performed over both reads and writes. On the other hand, checking error correcting codes only at reads alone can be vulnerable even for single-bit soft errors, while that at both reads and writes provides the perfect reliability.

Original languageEnglish (US)
Article number93
JournalACM Transactions on Embedded Computing Systems
Volume16
Issue number4
DOIs
StatePublished - May 2017

Keywords

  • Cache
  • Error correction code
  • Parity code
  • Reliability
  • Simulation
  • Soft error
  • Transient fault
  • Vulnerability

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Protecting caches from soft errors: A microarchitect's perspective'. Together they form a unique fingerprint.

Cite this