Abstract
One of the most difficult data flow errors to detect caused by single-event upsets in space radiation is the Silent Data Corruption (SDC). To solve the problem of multi-bit upsets causing program SDC, an instruction multi-bit SDC vulnerability prediction model based on one-class support vector machine classification is built using SDC vulnerability analysis, which has more accurate vulnerability instruction identification capabilities. By hardening the program with selective instruction redundancy, we propose a multi-bit data flow error detection method for detecting SDC error (SDCVA-OCSVM), aiming to protect the data in the memory or register used by the program. We have also verified the effectiveness of the method through comparative experiments. The method has been verified to have a higher error detection rate and lower code size and time overhead.
- [1] . 2012. An efficient technique to tolerate MBU faults in register file of embedded processors. In Proceedings of the 16th CSI International Symposium on Computer Architecture and Digital Systems (CADS’12). IEEE, 115–120.Google Scholar
Cross Ref
- [2] . 2003. MiniMIPS: A simulation project for the computer architecture laboratory. ACM SIGCSE Bull. 35, 1 (2003), 64–68.Google Scholar
Digital Library
- [3] . 2001. Random forests. Machine Learn. 45, 1 (2001), 5–32.Google Scholar
Digital Library
- [4] . 2018. Wukong: Explorer of dark matter particles. KEXUE 70, 3 (2018), 18–20.Google Scholar
- [5] . 2019. Multi-bit upsets vulnerability analysis of modern microprocessors. In Proceedings of the IEEE International Symposium on Workload Characterization (IISWC’19). IEEE, 119–130.Google Scholar
Cross Ref
- [6] . 2016. Reliability on ARM processors against soft errors through SIHFT techniques. IEEE Trans. Nuclear Sci. 63, 4 (2016), 2208–2216.Google Scholar
- [7] . 2016. Characterization of single bit and multiple cell soft error events in planar and FinFET SRAMs. IEEE Trans. Device Mater. Reliabil. 16, 2 (2016), 132–137.Google Scholar
Cross Ref
- [8] . 2018. An efficient EDAC approach for handling multiple-bit upsets in memory array. Microelectron. Reliabil. 88 (2018), 214–218.Google Scholar
Cross Ref
- [9] . 2020. Fault detection for turboshaft engine based on local density weighted one-class SVM algorithm. J. Comput. Appl. 40, 3, Article
917 (2020), 917–924.Google Scholar - [10] . 2012. Low-cost program-level detectors for reducing silent data corruptions. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’12). IEEE, 1–12.Google Scholar
Cross Ref
- [11] . 2012. Relyzer: Exploiting application-level fault equivalence to analyze application resiliency to transient faults. ACM SIGARCH Comput. Arch. News 40, 1 (2012), 123–134.Google Scholar
Digital Library
- [12] . 2017. Improving run-time bug detection in aviation software using program slicing. In Proceedings of the IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER’17). IEEE, 1252–1256.Google Scholar
Cross Ref
- [13] . 1996. Artificial neural networks: A tutorial. Computer 29, 3 (1996), 31–44.Google Scholar
Digital Library
- [14] . 2011. Technical support to the national highway traffic safety administration on the reported toyota motor corporation unintended acceleration investigation. NASA Engineering and Safety Center Technical Assessment Report (Jan. 2011).Google Scholar
- [15] . 2019. Identifying sdc-causing instructions based on random forests algorithm. KSII Trans. Internet Info. Syst. 13, 3 (2019), 1566–1582.Google Scholar
- [16] . 2019. A methodology to assess output vulnerability factors for detecting silent data corruption. IEEE Access 7 (2019), 118135–118145.Google Scholar
Cross Ref
- [17] . 2014. Integrated OCSVM mechanism for intrusion detection in SCADA systems. Electr. Lett. 50, 25 (2014), 1935–1936.Google Scholar
Cross Ref
- [18] . 2014. Grey wolf optimizer. Adv. Eng. Softw. 69 (2014), 46–61.Google Scholar
Digital Library
- [19] . 2016. Modified grey wolf optimizer for global engineering optimization. Appl. Comput. Intell. Soft Comput. 2016 (2016).Google Scholar
- [20] . 1998. Automatic construction of decision trees from data: A multi-disciplinary survey. Data Mining and Knowledge Discovery 2, 4 (1998), 345–389.Google Scholar
Digital Library
- [21] . 2010. Soft Errors in Modern Electronic Systems. Vol. 41. Springer Science & Business Media.Google Scholar
Digital Library
- [22] . 2002. Error detection by duplicated instructions in super-scalar processors. IEEE Trans. Reliabil. 51, 1 (2002), 63–75.Google Scholar
Cross Ref
- [23] . 2008. SymPLFIED: Symbolic program-level fault injection and error detection framework. In Proceedings of the IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN’08). IEEE, 472–481.Google Scholar
Cross Ref
- [24] . 2011. Single-event Effects in Aerospace. John Wiley & Sons.Google Scholar
Cross Ref
- [25] . 2005. SWIFT: Software implemented fault tolerance. In Proceedings of the International Symposium on Code Generation and Optimization. IEEE, 243–254.Google Scholar
Digital Library
- [26] . 2018. GPU-Accelerated Soft Error Rate Analysis of Large-Scale Integrated Circuits. IEEE Design Test 35, 6 (2018), 78–85.Google Scholar
Cross Ref
- [27] . 2017. Online soft-error vulnerability estimation for memory arrays and logic cores. IEEE Trans. Comput.-Aided Design Integr. Circ. Syst. 37, 2 (2017), 499–511.Google Scholar
Digital Library
- [28] . 2018. Neural network based silent error detector. In Proceedings of the IEEE International Conference on Cluster Computing (CLUSTER’18). IEEE, 168–178.Google Scholar
Cross Ref
- [29] . 2019. Power system anomaly detection based on OCSVM optimized by improved particle swarm optimization. IEEE Access 7 (2019), 181580–181588.Google Scholar
Cross Ref
- [30] . 2012. Understanding soft error propagation using efficient vulnerability-driven fault injection. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’12). IEEE, 1–12.Google Scholar
- [31] . 2019. Identify silent data corruption vulnerable instructions using SVM. IEEE Access 7 (2019), 40210–40219.Google Scholar
Cross Ref
- [32] . 2007. Error flow model: Modeling and analysis of software propagating hardware faults. Ruan Jian Xue Bao (J. Softw.) 18, 4 (2007), 808–820.Google Scholar
- [33] . 2019. “Space rescue”: A chronicle of China’s faulty satellite rescue. Yanhuang Chunqiu 09 (2019), 19–23.Google Scholar
- [34] . 2018. Improved grey wolf optimizer for the TFT-LCD module assembly scheduling problem. J. Chinese Comput. Syst. 39, 10, Article
2146 (2018), 7 pages.Google Scholar - [35] . 2012. Multiple-bit-upset and single-bit-upset resilient 8T SRAM bitcell layout with divided wordline structure. IEICE Trans. Electron. 95, 10 (2012), 1675–1681.Google Scholar
Cross Ref
Index Terms
Multi-bit Data Flow Error Detection Method Based on SDC Vulnerability Analysis
Recommendations
A Novel Concurrent Error Detection Scheme for FFT Networks
The algorithm-based fault tolerance techniques have been proposed to obtain reliableresults at very low hardware overhead. Even though 100% fault coverage can betheoretically obtained by using these techniques, the system performance, i.e., ...
BCH 2-Bit and 3-Bit Error Correction with Fast Multi-Bit Error Detection
Architecture of Computing SystemsAbstractIn this paper an new approach combining 2-bit and 3-bit BCH error correction with fast and simple error detection for errors of higher order is presented. Under the assumption that a 2-bit error or 3-bit error occurred, the corresponding ...
Systematic t-Error Correcting/All Unidirectional Error Detecting Codes
In this paper we give methods for the construction of systematic t-random error correcting and all unidirectional error detecting codes. Also we give the encoding/decoding algorithms and discuss their implementation.






Comments