Silent Data Corruption Estimation and Mitigation Without Fault Injection

IF 1.9 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE IEEE Canadian Journal of Electrical and Computer Engineering Pub Date : 2022-09-07 DOI:10.1109/ICJECE.2022.3189043
Moona Yakhchi;Mahdi Fazeli;Seyyed Amir Asghari
{"title":"Silent Data Corruption Estimation and Mitigation Without Fault Injection","authors":"Moona Yakhchi;Mahdi Fazeli;Seyyed Amir Asghari","doi":"10.1109/ICJECE.2022.3189043","DOIUrl":null,"url":null,"abstract":"Silent data corruptions (SDCs) have been always regarded as the serious effect of radiation-induced faults. Traditional solutions based on redundancies are very expensive in terms of chip area, energy consumption, and performance. Consequently, providing low-cost and efficient approaches to cope with SDCs has received researchers’ attention more than ever. On the other hand, identifying SDC-prone data and instruction in a program is a very challenging issue, as it requires time-consuming fault injection processes into different parts of a program. In this article, we present a cost-efficient approach to detecting and mitigating the rate of SDCs in the whole program with the presence of multibit faults without a fault injection process. This approach uses a combination of machine learning and a metaheuristic algorithm that predicts the SDC event rate of each instruction. The evaluation results show that the proposed approach provides a high level of detection accuracy of 99% while offering a low-performance overhead of 58%.","PeriodicalId":100619,"journal":{"name":"IEEE Canadian Journal of Electrical and Computer Engineering","volume":"45 3","pages":"318-327"},"PeriodicalIF":1.9000,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Canadian Journal of Electrical and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/9880922/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

Silent data corruptions (SDCs) have been always regarded as the serious effect of radiation-induced faults. Traditional solutions based on redundancies are very expensive in terms of chip area, energy consumption, and performance. Consequently, providing low-cost and efficient approaches to cope with SDCs has received researchers’ attention more than ever. On the other hand, identifying SDC-prone data and instruction in a program is a very challenging issue, as it requires time-consuming fault injection processes into different parts of a program. In this article, we present a cost-efficient approach to detecting and mitigating the rate of SDCs in the whole program with the presence of multibit faults without a fault injection process. This approach uses a combination of machine learning and a metaheuristic algorithm that predicts the SDC event rate of each instruction. The evaluation results show that the proposed approach provides a high level of detection accuracy of 99% while offering a low-performance overhead of 58%.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无故障注入的静默数据损坏估计与缓解
无声数据损坏(SDCs)一直被认为是辐射引起的故障的严重影响。基于冗余的传统解决方案在芯片面积、能耗和性能方面都非常昂贵。因此,提供低成本、高效的方法来应对SDCs比以往任何时候都更受到研究人员的关注。另一方面,识别程序中易于SDC的数据和指令是一个非常具有挑战性的问题,因为它需要将耗时的故障注入程序的不同部分。在本文中,我们提出了一种经济高效的方法,在存在多位故障的情况下,在没有故障注入过程的情况下检测和降低整个程序中SDCs的发生率。这种方法结合了机器学习和元启发式算法,预测每条指令的SDC事件率。评估结果表明,所提出的方法提供了99%的高水平检测精度,同时提供了58%的低性能开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
3.70
自引率
0.00%
发文量
0
期刊最新文献
Deep Generative Models for Node Embedding and Neighborhood Prediction in Dynamic Graphs of Recommendation Systems Robust Face Recognition and Classification Under Occlusion Using a Refined Transformer-Based Attention Mechanism Efficient Resource Allocation in Edge Networks Using Autoencoder-Based Capacity Optimization and SHA-512 Security Data-Driven Cyberattack Detection Based on Deep Learning for Power Cyber–Physical Systems An Empirical Analysis of NLP-Based Databases for Inventory Management
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1