Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








121 Hits in 3.2 sec

Hauberk: Lightweight Silent Data Corruption Error Detector for GPGPU

Keun Soo Yim, Cuong Pham, Mushfiq Saleheen, Zbigniew Kalbarczyk, Ravishankar Iyer
2011 2011 IEEE International Parallel & Distributed Processing Symposium  
On average, 16-33% of injected faults cause silent data corruption (SDC) errors in the HPC programs executing on GPU.  ...  ACKNOWLEDGEMENT We would like to thank John Stratton in the IMPACT group who provided data sets for some benchmark programs.  ...  data corruption (SDC) error.  ... 
doi:10.1109/ipdps.2011.36 dblp:conf/ipps/YimPSKI11 fatcat:rew7nnglzng67jpjh2ttngn5ou

Characterizing System-Level Masking Effects against Soft Errors

Yohan Ko
2021 Electronics  
This study analyzes and characterizes microarchitecture-level and software-level masking effects by developing an automated framework with exhaustive fault injections (i.e., soft errors) based on a cycle-accurate  ...  If their outputs are different, it is also defined as a failure (silent data corruption).  ...  If their outputs are different, they are also defined as failures (i.e., silent data corruption).  ... 
doi:10.3390/electronics10182286 fatcat:ipsnsk6aizgw7mxiqsf4ugc7bm

Efficient soft error protection for commodity embedded microprocessors using profile information

Daya Shanker Khudia, Griffin Wright, Scott Mahlke
2012 Proceedings of the 13th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, Tools and Theory for Embedded Systems - LCTES '12  
Silent corruptions or infinite loop: Faults that produce user visible corruptions, cause early program termination, or do not terminate in definite time are classified into this category.  ...  In our experiments, faults in other microarchitectural structures are not explicitly injected, but faults in other structures predominantly manifest through register file as corrupted states.  ... 
doi:10.1145/2248418.2248433 dblp:conf/lctrts/KhudiaWM12 fatcat:e7wuhfunkfde3nc66ro3fd5yi4

An Ultra-Low-Cost Soft Error Protection Scheme Based on the Selection of Critical Variables

Yohan Ko
2021 Electronics  
In the real world, silent data corruption can result in severe data loss and can require months of debugging time [37, 38] .  ...  This type of system failure is called silent data corruption (SDC) since they are hardly found until programs finish.  ... 
doi:10.3390/electronics10172101 fatcat:2hvrsnnpxrgbtb2tms6uu4mkp4

Reliability: Fallacy or Reality?

Antonio Gonzalez, Scott Mahlke, Shubu Mukherjee, Resit Sendag, Derek Chiou, Joshua J. Yi
2007 IEEE Micro  
Mukherjee: A system hang is not necessarily a detected error; it can cause silent data corruptions.  ...  If the hardware failure is a silent failure, I don't know if my data is corrupted, I have no indication.  ... 
doi:10.1109/mm.2007.107 fatcat:z3nkucclerednjg445p77c6lci

Revisiting Symptom-Based Fault Tolerant Techniques against Soft Errors

Hwisoo So, Moslem Didehban, Yohan Ko, Reiley Jeyapaul, Jongho Kim, Youngbin Kim, Kyoungwoo Lee, Aviral Shrivastava
2021 Electronics  
These failures are defined as silent output corruptions (SOCs) [49], a meaningful subset of silent data corruptions.  ...  Didehban, M.; Shrivastava, A. nZDC: A Compiler technique for near zero silent data corruption.  ... 
doi:10.3390/electronics10233028 fatcat:6xmgwau25bgxpjm2jdhjop623y

Design and Evaluation of Hybrid Fault-Detection Systems

George A. Reis, Jonathan Chang, Neil Vachharajani, Ram Rangan, David I. August, Shubhendu S. Mukherjee
2005 SIGARCH Computer Architecture News  
Data Corruption (SDC).  ...  If the register value is used in a store instruction, faults during these vulnerable periods can lead to silent data corruption.  ... 
doi:10.1145/1080695.1069983 fatcat:muhy337xgbdxvclmdsmrmlnjwa

SimpliFI: Hardware Simulation of Embedded Software Fault Attacks

Jacob Grycel, Patrick Schaumont
2021 Cryptography  
fault models hide the true sensitivity of the underlying processor hardware to fault injection, and they are unable to correctly capture fault effects in the programmer-invisible part of the processor microarchitecture  ...  When faults are injected at the beginning of execution in stage 0, only clock glitch widths between 7.25 and 5.5 ns result in corrupted output data.  ...  data flow.  ... 
doi:10.3390/cryptography5020015 fatcat:zjo6ea5tenc43ezyro4ircilyi

A Systematic Review of Fault Injection Attacks on IoT Systems

Aakash Gangolli, Qusay H. Mahmoud, Akramul Azim
2022 Electronics  
Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ...  Unlike the above-mentioned methods, the proposed approach could detect system-level threats, such as silent data corruption (SDC) and functional interruption (SEFI), for FPGA-based applications.  ...  Data Corruption and Manipulation In this category, fault injection attacks affect the data being used in the targeted software.  ... 
doi:10.3390/electronics11132023 fatcat:ic5ytu5nlnfpnhlualafdbcztu

Phaser: Phased methodology for modeling the system-level effects of soft errors

J. A. Rivers, P. Bose, P. Kudva, J.-D. Wellman, P. N. Sanda, E. H. Cannon, L. C. Alves
2008 IBM Journal of Research and Development  
This paper presents an overview of Phaser, a toolset and methodology for modeling the effects of soft errors on the architectural and microarchitectural functionality of a system.  ...  In this paper, the Phaser/M1 methodology is described with a single focus only on silent data corruption (SDC)related SER manifested at the program output.  ...  Naturally, if a soft error hits a location with a live data value, it will corrupt the data.  ... 
doi:10.1147/rd.523.0293 fatcat:3ib34h73wffzfkebbhbvdtpv2y

Enabling GPGPU Low-Level Hardware Explorations with MIAOW

Raghuraman Balasubramanian, Pradip Valathol, Karthikeyan Sankaralingam, Vinay Gangadhar, Ziliang Guo, Chen-Han Ho, Cherin Joseph, Jaikrishnan Menon, Mario Paulo Drumond, Robin Paul, Sharath Prasad
2015 ACM Transactions on Architecture and Code Optimization (TACO)  
We first explore if MIAOW is realistic and then use four case studies to show that MIAOW enables the following: physical design perspective to "traditional" microarchitecture, new types of research exploration  ...  While useful for modeling first-order effects, these tools do not provide a detailed view of GPU microarchitecture and physical design.  ...  PHYSICAL DESIGN PERSPECTIVE OF TRADITIONAL MICROARCHITECTURE RESEARCH Description.  ... 
doi:10.1145/2764908 fatcat:utj6prgm2zcctlb36ikgejny2e

CLEAN-ECC

Seong-Lyong Gong, Minsoo Rhu, Jungrae Kim, Jinsuk Chung, Mattan Erez
2015 Proceedings of the 48th International Symposium on Microarchitecture - MICRO-48  
However, these schemes were not evaluated for their impact on silent data corruption risk in detail.  ...  CE, DUE and SDC stand for corrected fault, detected but uncorrectable fault and silent data corruption.  ... 
doi:10.1145/2830772.2830799 dblp:conf/micro/GongRKCE15 fatcat:mjjew46fwzgv3iuilrlfnjmkki

RAP Model—Enabling Cross-Layer Analysis and Optimization for System-on-Chip Resilience [chapter]

Andreas Herkersdorf, Michael Engel, Michael Glaß, Jörg Henkel, Veit B. Kleeberger, Johannes M. Kühn, Peter Marwedel, Daniel Mueller-Gritschneder, Sani R. Nassif, Semeen Rehman, Wolfgang Rosenstiel, Ulf Schlichtmann (+4 others)
2020 Embedded Systems  
level, knowledge about the unit of design and its environment allow the transformation of the bit-related error functions into characteristic higher layer representations, such as error functions for data  ...  Furthermore, we show by different examples how probabilistic bit flips are systematically abstracted and propagated towards instruction and data vulnerability at MPSoC architecture level, and how RAP can  ...  Still, such problems are detectable on microarchitectural level. In (2) , silent data corruption (SDC) in the control algorithm happens.  ... 
doi:10.1007/978-3-030-52017-5_1 fatcat:ip3awa6v6bfrbbciabmtwuxl7a

GPGPUs: How to combine high computational power with high reliability

L. Bautista Gomez, F. Cappello, L. Carro, N. DeBardeleben, B. Fang, S. Gurumurthi, K. Pattabiraman, P. Rech, M. Sonza Reorda
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014  
As a way to control this experiment, ANL developed a test program that can be used to check for performance variations and silent data corruption.  ...  Program failures can be further classified into crashes (i.e., hardware exceptions), hangs, and Silent Data Corruptions (SDCs), i.e., incorrect outputs.  ... 
doi:10.7873/date.2014.354 dblp:conf/date/Bautista-GomezCCDFGPRR14 fatcat:y476sawz3jgy5g4hox4iarldsy

MAVFI: An End-to-End Fault Analysis Framework with Anomaly Detection and Recovery for Micro Aerial Vehicles [article]

Yu-Shun Hsiao, Zishen Wan, Tianyu Jia, Radhika Ghosal, Abdulrahman Mahmoud, Arijit Raychowdhury, David Brooks, Gu-Yeon Wei, Vijay Janapa Reddi
2023 arXiv   pre-print
We introduce MAVFI, the micro aerial vehicles (MAVs) resilience analysis methodology to assess the effect of silent data corruption (SDC) on UAVs' mission metrics, such as flight time and success rate,  ...  INTRODUCTION Silent data corruptions (SDCs) have become an important problem [1] . It has been shown as a major issue for server scale systems [2] , [3] .  ...  Prior works have evaluated data field impact on the processor and neural network [1] , and we further corroborate this in end-to-end UAV systems from the application-level perspective.  ... 
arXiv:2105.12882v3 fatcat:scvhlhvfb5avdiydscvgocskti
« Previous Showing results 1 — 15 out of 121 results