Browse > Article
http://dx.doi.org/10.3837/tiis.2021.05.014

A Configurable Software-based Approach for Detecting CFEs Caused by Transient Faults  

Liu, Wei (Computer department, Beijing Institute of Technology)
Ci, LinLin (Computer department, Beijing Institute of Technology)
Liu, LiPing (Computer department, Beijing Institute of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.5, 2021 , pp. 1829-1846 More about this Journal
Abstract
Transient faults occur in computation units of a processor, which can cause control flow errors (CFEs) and compromise system reliability. The software-based methods perform illegal control flow detection by inserting redundant instructions and monitoring signature. However, the existing methods not only have drawbacks in terms of performance overhead, but also lack of configurability. We propose a configurable approach CCFCA for detecting CFEs. The configurability of CCFCA is implemented by analyzing the criticality of each region and tuning the detecting granularity. For critical regions, program blocks are divided according to space-time overhead and reliability constraints, so that protection intensity can be configured flexibly. For other regions, signature detection algorithms are only used in the first basic block and last basic block. This helps to improve the fault-tolerant efficiency of the CCFCA. At the same time, CCFCA also has the function of solving confusion and instruction self-detection. Our experimental results show that CCFCA incurs only 10.61% performance overhead on average for several C benchmark program and the average undetected error rate is only 9.29%. CCFCA has high error coverage and low overhead compared with similar algorithms. This helps to meet different cost requirements and reliability requirements.
Keywords
Fault tolerance; Reliability; Control flow errors; Configurability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Asghari S A, Taheri H, Pedram H, et al., "Software-based control flow checking against transient faults in industrial environments," IEEE Transactions on Industrial Informatics, 10(1), 481-490, 2013.   DOI
2 Pandiyan G, Krishnakumari P, "An efficient software defect prediction model using optimized tabu search branch and bound procedure," Metropolitan Museum of Art Bulletin, 10(1), 73-79, 2015.
3 Alkhalifa, Z, Nair, V.S.S, Krishnamurthy, N, et al., "Design and evaluation of system-level checks for on-line control flow error detection," IEEE Transactions on Parallel & Distributed Systems, 10(6), 627-641, 1999.   DOI
4 Nicolescu B, Savaria Y, Velazco R, "Software detection mechanisms providing full coverage against single bit-flip faults," IEEE Transactions on Nuclear Science, 51(6), 3510-3518, 2004.   DOI
5 Vemu R, Abraham J, "CEDA: Control-Flow Error Detection Using Assertions," IEEE Transactions on Computers, 60(9), 1233-1245, 2011.   DOI
6 T. Austin, E. Larson and D. Ernst, "SimpleScalar: an infrastructure for computer system modeling," Computer, 35(2), 59-67, 2002.   DOI
7 Kai Zhang, Junchang Wang, Bei Hua, "Building High-Performance Application Protocol Parsers on Multi-core Architectures," in Proc. of 2011 IEEE 17th International Conference on Parallel and Distributed Systems, 2012.
8 Luk C K, Cohn R, Muth R, et al., "Pin: building customized program analysis tools with dynamic instrumentation," ACM Sigplan Notices, 40(6), 190-200, 2005.   DOI
9 Azambuja, Altieri M, Becker J, et al., "HETA: hybrid error-detection technique using assertions," IEEE Transactions on Nuclear Science, 60(4), 2805-2812, 2013.   DOI
10 Namjoo M, McCluskey E J, "Watchdog processors and capability checking," in Proc. of Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995.
11 Ahmed R, El Sayed M, Gadsden S A, et al., "Automotive internal-combustion-engine fault detection and classification using artificial neural network techniques," IEEE Transactions on Vehicular Technology, 64(1), 21-33, 2015.   DOI
12 Zheng B, Gao Y, Zhu Q, et al., "Analysis and optimization of soft error tolerance strategies for real-time systems," in Proc. of International Conference on Hardware/software Codesign and System Synthesis, 55-64, 2015.
13 Mitra D, Ghoshal S, Rahaman H, et al., "On-line error detection in digital microfluidic biochips," in Proc. of the 21th Test Symposium, 332-337, 2012.
14 Oh N, Shirvani P P, Mccluskey E J, "Control-flow checking by software signatures," IEEE Transactions on Reliability, 51(1), 111-122, 2002.   DOI
15 Boroomandnezhad T, Azgomi M A, "An efficient control-flow checking technique for the detection of soft-errors in embedded software," Computers and Electrical Engineering, 39(4), 1320-1332, 2013.   DOI
16 Wang H, Wang H, Jin Z, "Bipartite graph-based control flow checking for COTS-based small satellites," Chinese Journal of Aeronautics, 28(3), 883-893, 2015.   DOI
17 Mohamed A, Zulkernine M, "A control flow representation for component-based software reliability analysis," in Proc. of the 6th IEEE International Conference on Software Security and Reliability, 1-10, 2012.
18 Rajabpour N, Sedaghat Y. A, "software-based error detection technique for monitoring the program execution of RTUs in SCADA," Computer Safety, Reliability, and Security, Springer, 2015.
19 Liping LIU, Linlin CI, Wei LIU, et al., "Control Flow Checking at Virtual Edges," KSII Transactions on Internet and Information Systems, 11(1), 396-413, 2017.   DOI
20 Li A, Hong B, "On-line control flow error detection using relationship signatures among basic blocks," Computers & Electrical Engineering, 36(1), 132-141, 2010.   DOI
21 Parra L, Lindoso A, Portela M, et al., "Efficient mitigation of data and control flow errors in microprocessors," in Proc. of European Conference on Radiation & Its Effects on Components & Systems, pp. 1-4, 2013.
22 Schuette M A, Shen J P, "Processor Control Flow Monitoring Using Signatured Instruction Streams," IEEE Transactions on Computers, C-36(3), 264-276, 1987.   DOI
23 Wang P, et al., "X-ray and proton radiation effects on 40 nm CMOS physically unclonable function devices," IEEE Transactions on Nuclear Science, 65(8), 1519-1524, 2018.   DOI
24 Musenich R, Calvelli V, Giraudo M, et al., "The limits of space radiation magnetic shielding: an updated analysis," IEEE Transactions on Applied Superconductivity, 28(3), 1-5, 2018.
25 Chen W, Varanasi N, Pouget V, et al., "Impact of VCO topology on SET induced frequency response," IEEE Transactions on Nuclear Science, 54(6), 2500-2505, 2007.   DOI
26 Dicello J F, Paciotti M, Schillaci M E, "An estimate of error rates in integrated circuits at aircraft altitudes and at sea level," Nuclear Instruments and Methods in Physics Research Section B: Beam Interactions with Materials and Atoms, 40(2), 1295-1299, 1989.   DOI
27 Wang H B, Kauppila J S, Lilja K, et al., "Evaluation of SEU performance of 28-nm FDSOI flip-flop designs," IEEE Transactions on Nuclear Science, 64(1), 367-373, 2017.   DOI
28 Ohlsson J, Rimen M, Gunneflo U, "A study of the effects of transient fault injection into a 32-bit RISC with built-in watchdog," in Proc. of IEEE International Symposium on Fault-Tolerant Computing, 316-325, 1992.
29 Baldassin A, Centoducatte P, Rigo S, et al., "An open-source binary utility generator," ACM Transactions on Design Automation of Electronic Systems, 13(2), 1-17, 2008.
30 Asghari S A, Abdi A, Taheri H, et al., "SEDSR: Soft Error Detection Using Software Redundancy," Journal of Software Engineering & Applications, 5(9), 664-670, 2012.   DOI