A non-conservative software-based approach for detecting illegal CFEs caused by transient faults
Paper in proceedings, 2015

Software-based methods for the detection of control-flow errors caused by transient fault usually consist in the introduction of protecting instructions both at the beginning and at the end of basic blocks. These methods are conservative in nature, in the sense that they assume that all blocks have the same probability of being the target of control flow errors. Because of that assumption they can lead to a considerable increase both in memory and performance overhead during execution time. In this paper, we propose a static analysis that provide a more refined information about which basic blocks can be the target of control-flow-errors caused by single-bit flips. This information can then be used to guide a program transformation in which only susceptible blocks have to be protected. We implemented the static analysis and program transformation in the context of the LLVM framework and performed an extensive fault injection campaign. Our experiments show that this less conservative approach can potentially lead to gains both in memory usage and in execution time while keeping high fault coverage.

Reliability

availability

and service-ability

Fault tolerance

Author

D. G. Rodrigues

Universidade Federal do Rio Grande do Sul (UFRGS)

G. Nazarian

Delft University of Technology

A. Moreira

Universidade Federal do Rio Grande do Sul (UFRGS)

L. Carro

Universidade Federal do Rio Grande do Sul (UFRGS)

Georgi Gaydadjiev

Chalmers, Computer Science and Engineering (Chalmers), Computer Engineering (Chalmers)

Proceedings of the 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2015

221-226

Subject Categories

Computer Engineering

Computer and Information Science

Areas of Advance

Information and Communication Technology

DOI

10.1109/DFT.2015.7315166

ISBN

978-1-5090-0312-9

More information

Latest update

5/14/2018