首页 > 最新文献

2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)最新文献

英文 中文
Base Address Recognition with Data Flow Tracking for Injection Attack Detection 基于数据流跟踪的基址识别注入攻击检测
S. Katsunuma, H. Kurita, Ryota Shioya, Kazuto Shimizu, H. Irie, M. Goshima, S. Sakai
Vulnerabilities such as buffer overflows exist in some programs, and such vulnerabilities are susceptible to address injection attacks. The input data tracking method, which was proposed before, prevents I-data, which are the data derived from the input data, being used as addresses. However, the rules to determine address injection attacks are vague, which produces many false-positives and false-negatives in detection results. Generally, the data used as an address consist of a base address and an address offset. We propose an architectural technique to prevent I-data overwriting B-data, which are the data used as base addresses in this paper. It dynamically recognizes the I-data and the B-data. Address injection is detected if I-data that are not B-data are used as addresses. We implemented the proposed technique on a Pentium-based Bochs emulator and investigated its detection capability. We believe that the technique is the most accurate injection detection technique proposed thus far
部分程序存在缓冲区溢出等漏洞,容易受到地址注入攻击。之前提出的输入数据跟踪方法可以防止I-data(从输入数据派生的数据)被用作地址。但是,地址注入攻击的判定规则比较模糊,导致检测结果出现了很多假阳性和假阴性。通常,用作地址的数据由基址和地址偏移量组成。我们提出了一种架构技术来防止i数据覆盖b数据,b数据是本文中用作基址的数据。它动态地识别i数据和b数据。如果使用非b数据的i数据作为地址,则检测到地址注入。我们在基于pentium的Bochs仿真器上实现了该技术,并研究了其检测能力。我们认为该技术是目前提出的最精确的注射检测技术
{"title":"Base Address Recognition with Data Flow Tracking for Injection Attack Detection","authors":"S. Katsunuma, H. Kurita, Ryota Shioya, Kazuto Shimizu, H. Irie, M. Goshima, S. Sakai","doi":"10.1109/PRDC.2006.22","DOIUrl":"https://doi.org/10.1109/PRDC.2006.22","url":null,"abstract":"Vulnerabilities such as buffer overflows exist in some programs, and such vulnerabilities are susceptible to address injection attacks. The input data tracking method, which was proposed before, prevents I-data, which are the data derived from the input data, being used as addresses. However, the rules to determine address injection attacks are vague, which produces many false-positives and false-negatives in detection results. Generally, the data used as an address consist of a base address and an address offset. We propose an architectural technique to prevent I-data overwriting B-data, which are the data used as base addresses in this paper. It dynamically recognizes the I-data and the B-data. Address injection is detected if I-data that are not B-data are used as addresses. We implemented the proposed technique on a Pentium-based Bochs emulator and investigated its detection capability. We believe that the technique is the most accurate injection detection technique proposed thus far","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121693507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Dependable Outbound Bandwidth Based Approach for Peer to Peer Media Streaming 基于可靠出站带宽的点对点媒体流
Z. Huang, Sheng-de Wang
A fundamental problem in peer-to-peer streaming is how to select peers with desired media data so that the best possible streaming quality can be maintained. In this paper, we propose an outbound bandwidth based streaming model in which peers are layered according to their offered outbound bandwidth and are permitted to request data of peers from upper layers peers only. Based on the layered approach, a media data assignment algorithm for the subset of media data is presented to select qualified sending peers to ensure that they are received before their scheduled playback time. We also present two resolutions for request conflicts, which arise when there are more than one peer simultaneously requesting data from the same sending peer that can't afford outbound bandwidth for all requests. We evaluated the proposed streaming model through simulations. Experimental results show that streaming quality of the proposed streaming model is excellent and the properties of scalability as well as robustness are obtained even in a highly dynamic environment where peers join and leave frequently
点对点流的一个基本问题是如何选择具有所需媒体数据的点,以保持最佳的流质量。在本文中,我们提出了一种基于出站带宽的流模型,在该模型中,对等体根据提供的出站带宽分层,并且只允许从上层对等体请求对等体的数据。在分层方法的基础上,提出了一种针对媒体数据子集的媒体数据分配算法,用于选择合格的发送对等体,以确保它们在预定的播放时间之前被接收。我们还提出了两种解决请求冲突的方法,当有多个对等点同时向同一个发送对等点请求数据时,无法为所有请求提供出站带宽。我们通过仿真对所提出的流模型进行了评估。实验结果表明,该模型具有良好的流质量,即使在节点频繁加入和离开的高动态环境中也具有良好的可扩展性和鲁棒性
{"title":"A Dependable Outbound Bandwidth Based Approach for Peer to Peer Media Streaming","authors":"Z. Huang, Sheng-de Wang","doi":"10.1109/PRDC.2006.6","DOIUrl":"https://doi.org/10.1109/PRDC.2006.6","url":null,"abstract":"A fundamental problem in peer-to-peer streaming is how to select peers with desired media data so that the best possible streaming quality can be maintained. In this paper, we propose an outbound bandwidth based streaming model in which peers are layered according to their offered outbound bandwidth and are permitted to request data of peers from upper layers peers only. Based on the layered approach, a media data assignment algorithm for the subset of media data is presented to select qualified sending peers to ensure that they are received before their scheduled playback time. We also present two resolutions for request conflicts, which arise when there are more than one peer simultaneously requesting data from the same sending peer that can't afford outbound bandwidth for all requests. We evaluated the proposed streaming model through simulations. Experimental results show that streaming quality of the proposed streaming model is excellent and the properties of scalability as well as robustness are obtained even in a highly dynamic environment where peers join and leave frequently","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125153426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Scenario of Tolerating Interaction Faults Between Otherwise Correct Systems 容忍系统间交互错误的场景
B. Nassu, T. Nanya
In this paper, a new scenario for tolerating interaction faults is presented. We also address the problem of designing a system capable of tolerating interaction faults generated by the other system. The scenario and other concepts defined in this paper were discussed with more detail. A system is defined as a pair of sub-systems that use a communication standard to interact. Interaction occurs with the exchange of a sequence of messages, each containing a set of data fields. The system that can exhibit faulty behavior is called the external unit. The other system, which is designed to tolerate faults, is the adaptable unit
本文提出了一种新的容忍交互故障的场景。我们还讨论了设计一个能够容忍其他系统产生的交互错误的系统的问题。更详细地讨论了本文中定义的场景和其他概念。系统被定义为一对使用通信标准进行交互的子系统。交互发生在消息序列的交换中,每个消息序列包含一组数据字段。能够表现出错误行为的系统称为外部单元。另一个被设计成容错的系统是适应性单元
{"title":"A Scenario of Tolerating Interaction Faults Between Otherwise Correct Systems","authors":"B. Nassu, T. Nanya","doi":"10.1109/PRDC.2006.13","DOIUrl":"https://doi.org/10.1109/PRDC.2006.13","url":null,"abstract":"In this paper, a new scenario for tolerating interaction faults is presented. We also address the problem of designing a system capable of tolerating interaction faults generated by the other system. The scenario and other concepts defined in this paper were discussed with more detail. A system is defined as a pair of sub-systems that use a communication standard to interact. Interaction occurs with the exchange of a sequence of messages, each containing a set of data fields. The system that can exhibit faulty behavior is called the external unit. The other system, which is designed to tolerate faults, is the adaptable unit","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117234393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Database Transaction Management for High-Availability Cluster System 高可用性集群系统的数据库事务管理
K. Fujiyama, N. Nakamura, Ryuichi Hiraike
We propose a database transaction management framework that enables a database replication function to be added to existing cluster systems. This framework is generally applicable to various database products merely by replacing the database connection API library. In this framework, the enhanced database connection API library duplicates the transactions issued by clustered applications and issues them to the primary and backup databases while controlling the issue order for consistency between the two databases. We implemented the proposed framework on a database connection API library for Java and confirmed that the overhead caused by duplication and order control was smaller than the existing replication method's overhead
我们提出了一个数据库事务管理框架,使数据库复制功能能够添加到现有的集群系统中。该框架仅通过替换数据库连接API库,就可以普遍适用于各种数据库产品。在这个框架中,增强的数据库连接API库复制集群应用程序发出的事务,并将它们发送到主数据库和备份数据库,同时控制两个数据库之间的一致性问题顺序。我们在Java的数据库连接API库上实现了所提出的框架,并证实了由复制和顺序控制引起的开销比现有复制方法的开销要小
{"title":"Database Transaction Management for High-Availability Cluster System","authors":"K. Fujiyama, N. Nakamura, Ryuichi Hiraike","doi":"10.1109/PRDC.2006.23","DOIUrl":"https://doi.org/10.1109/PRDC.2006.23","url":null,"abstract":"We propose a database transaction management framework that enables a database replication function to be added to existing cluster systems. This framework is generally applicable to various database products merely by replacing the database connection API library. In this framework, the enhanced database connection API library duplicates the transactions issued by clustered applications and issues them to the primary and backup databases while controlling the issue order for consistency between the two databases. We implemented the proposed framework on a database connection API library for Java and confirmed that the overhead caused by duplication and order control was smaller than the existing replication method's overhead","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133987398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Single-Chip Fail-Safe Microprocessor with Memory Data Comparison Feature 一种具有内存数据比较功能的单片故障安全微处理器
K. Shimamura, Takeshi Takehara, Yosuke Shima, Kunihiko Tsunedomi
A single-chip fail-safe microprocessor has been developed. It contains two processor cores and realizes self-checking feature by comparing the processing results of the two processor cores. In order to overcome redundant input disagreement problem, two mechanisms have been implemented. The one is input data exchange mechanism used with bus comparison feature. The other is memory data comparison and copy mechanism. With the memory data comparison mechanism, input data comparison overhead can be reduced, which is especially useful for short period control task with many input data. The microprocessor utilizes 0.18mum CMOS process and integrates 512KB RAM and 25M transistors random logic in a 14.75mm x 14.75mm die. With the developed microprocessor, the size of a fault-tolerant controller can be reduced, which makes it easy to embed fault-tolerant controllers into equipments controlled
研制了一种单片故障安全微处理器。它包含两个处理器核心,并通过比较两个处理器核心的处理结果来实现自检功能。为了克服冗余输入不一致问题,实现了两种机制。一种是带有总线比较特性的输入数据交换机制。二是内存数据比较和复制机制。通过内存数据比较机制,可以减少输入数据比较开销,这对于具有大量输入数据的短周期控制任务特别有用。该微处理器采用0.18 mm CMOS工艺,在14.75mm x 14.75mm的芯片中集成了512KB RAM和25M晶体管随机逻辑。利用所开发的微处理器,可以减小容错控制器的尺寸,使容错控制器易于嵌入到被控设备中
{"title":"A Single-Chip Fail-Safe Microprocessor with Memory Data Comparison Feature","authors":"K. Shimamura, Takeshi Takehara, Yosuke Shima, Kunihiko Tsunedomi","doi":"10.1109/PRDC.2006.14","DOIUrl":"https://doi.org/10.1109/PRDC.2006.14","url":null,"abstract":"A single-chip fail-safe microprocessor has been developed. It contains two processor cores and realizes self-checking feature by comparing the processing results of the two processor cores. In order to overcome redundant input disagreement problem, two mechanisms have been implemented. The one is input data exchange mechanism used with bus comparison feature. The other is memory data comparison and copy mechanism. With the memory data comparison mechanism, input data comparison overhead can be reduced, which is especially useful for short period control task with many input data. The microprocessor utilizes 0.18mum CMOS process and integrates 512KB RAM and 25M transistors random logic in a 14.75mm x 14.75mm die. With the developed microprocessor, the size of a fault-tolerant controller can be reduced, which makes it easy to embed fault-tolerant controllers into equipments controlled","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131249122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Detection and Recovery for Disconnection Failures in a Web-based Medical Teleconsultation System 基于web的医疗远程会诊系统中断开故障的检测与恢复
K. Ssu, C. Chou, Wei-Te Shih, P. Chung, H. C. Jiau
With the progress of advanced technology, people anticipate better quality in the medical health care service. Due to more robust requirements in medical environments, higher availability and reliability are expected. This paper describes a recovery scheme for disconnection failures in a Web-based medical teleconsultation system. With the support, the disconnected clients can re-enter the system to resume the unfinished discussion using the synchronization mechanisms. The experiments have shown that the mechanism performed successfully. The lazy synchronization further reduced the required time that the clients had to wait for joining the consultation after network disconnections
随着先进技术的进步,人们对医疗保健服务质量的要求越来越高。由于医疗环境中有更强大的需求,因此期望有更高的可用性和可靠性。本文介绍了一种基于web的医疗远程会诊系统的断网故障恢复方案。有了这个支持,断开连接的客户机可以重新进入系统,使用同步机制恢复未完成的讨论。实验表明,该机构运行良好。延迟同步进一步减少了客户端在网络断开后等待加入咨询所需的时间
{"title":"Detection and Recovery for Disconnection Failures in a Web-based Medical Teleconsultation System","authors":"K. Ssu, C. Chou, Wei-Te Shih, P. Chung, H. C. Jiau","doi":"10.1109/PRDC.2006.28","DOIUrl":"https://doi.org/10.1109/PRDC.2006.28","url":null,"abstract":"With the progress of advanced technology, people anticipate better quality in the medical health care service. Due to more robust requirements in medical environments, higher availability and reliability are expected. This paper describes a recovery scheme for disconnection failures in a Web-based medical teleconsultation system. With the support, the disconnected clients can re-enter the system to resume the unfinished discussion using the synchronization mechanisms. The experiments have shown that the mechanism performed successfully. The lazy synchronization further reduced the required time that the clients had to wait for joining the consultation after network disconnections","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Stateful Approach to Spyware Detection and Removal 间谍软件检测和清除的有状态方法
Ming-Wei Wu, Yennun Huang, Yi-Min Wang, S. Kuo
Spyware, a type of potentially unwanted programs (PUPs), has become a significant threat to most Internet users as it introduces serious privacy disclosure and potential security breach to the systems. Current anti-spyware tools use signatures to detect spyware programs. Over time, spyware programs have grown more resilient to this technique; they utilize critical areas of the system to survive reboots and set up mini-installers that re-install a spyware program after it's been detected and removed. Since existing anti-spyware tools are stateless in the sense that they do not remember and monitor the spyware programs that were removed, they fail to permanently remove these self-healing spyware programs. This paper proposes STARS (stateful threat-aware removal system): a tool that at run time intercepts critical system accesses and assures removed spyware does not re-install itself after a successful removal of spyware program in the system. If a re-installation (self-healing) is detected, STARS infers the source of such activities and discovers additional "suspicious" programs. Experimental results show that STARS is effective in removing self-healing spyware programs that existing anti-spyware tools fail to do
间谍软件,一种潜在的不受欢迎的程序(pup),已经成为对大多数互联网用户的重大威胁,因为它给系统带来了严重的隐私泄露和潜在的安全漏洞。目前的反间谍工具使用签名来检测间谍软件程序。随着时间的推移,间谍软件程序对这种技术的适应能力越来越强;他们利用系统的关键区域在重新启动后存活下来,并设置迷你安装程序,在检测到并删除间谍软件程序后重新安装。由于现有的反间谍软件工具在某种意义上是无状态的,它们不会记住和监视被删除的间谍软件程序,因此它们无法永久删除这些自我修复的间谍软件程序。本文提出了STARS(有状态威胁感知移除系统):一个在运行时拦截关键系统访问并确保在成功移除系统中的间谍软件程序后被移除的间谍软件不会重新安装自身的工具。如果检测到重新安装(自我修复),STARS将推断此类活动的来源,并发现额外的“可疑”程序。实验结果表明,STARS能够有效地清除现有反间谍工具无法清除的自愈间谍程序
{"title":"A Stateful Approach to Spyware Detection and Removal","authors":"Ming-Wei Wu, Yennun Huang, Yi-Min Wang, S. Kuo","doi":"10.1109/PRDC.2006.15","DOIUrl":"https://doi.org/10.1109/PRDC.2006.15","url":null,"abstract":"Spyware, a type of potentially unwanted programs (PUPs), has become a significant threat to most Internet users as it introduces serious privacy disclosure and potential security breach to the systems. Current anti-spyware tools use signatures to detect spyware programs. Over time, spyware programs have grown more resilient to this technique; they utilize critical areas of the system to survive reboots and set up mini-installers that re-install a spyware program after it's been detected and removed. Since existing anti-spyware tools are stateless in the sense that they do not remember and monitor the spyware programs that were removed, they fail to permanently remove these self-healing spyware programs. This paper proposes STARS (stateful threat-aware removal system): a tool that at run time intercepts critical system accesses and assures removed spyware does not re-install itself after a successful removal of spyware program in the system. If a re-installation (self-healing) is detected, STARS infers the source of such activities and discovers additional \"suspicious\" programs. Experimental results show that STARS is effective in removing self-healing spyware programs that existing anti-spyware tools fail to do","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Two-Dimensional Software Reliability Models and Their Application 二维软件可靠性模型及其应用
Tomotaka Ishii, T. Dohi
In general, the software-testing time may be measured by two kinds of time scales: calendar time and test-execution time. In this paper, we develop two-dimensional software reliability models with two-time measures and incorporate both of them to assess the software reliability with higher accuracy. Since the resulting software reliability models are based on the familiar non-homogeneous Poisson processes with two-time scales, which are the natural extensions of one-dimensional models, it is possible to treat both the time data simultaneously and effectively. We investigate the dependence of test-execution time as a testing effort on the software reliability assessment, and validate quantitatively the software reliability models with two-time scales. We also consider an optimization problem when to stop the software testing in terms of two-time measurements
通常,软件测试时间可以用两种时间尺度来度量:日历时间和测试执行时间。本文建立了具有双时间度量的二维软件可靠性模型,并将两种度量结合起来,以提高软件可靠性评估的准确性。由于所得到的软件可靠性模型是基于熟悉的双时间尺度的非齐次泊松过程,这是一维模型的自然扩展,因此可以同时有效地处理两个时间数据。研究了测试执行时间作为测试工作量对软件可靠性评估的依赖关系,并在双时间尺度上对软件可靠性模型进行了定量验证。我们还考虑了一个优化问题,即何时停止两次测量的软件测试
{"title":"Two-Dimensional Software Reliability Models and Their Application","authors":"Tomotaka Ishii, T. Dohi","doi":"10.1109/PRDC.2006.64","DOIUrl":"https://doi.org/10.1109/PRDC.2006.64","url":null,"abstract":"In general, the software-testing time may be measured by two kinds of time scales: calendar time and test-execution time. In this paper, we develop two-dimensional software reliability models with two-time measures and incorporate both of them to assess the software reliability with higher accuracy. Since the resulting software reliability models are based on the familiar non-homogeneous Poisson processes with two-time scales, which are the natural extensions of one-dimensional models, it is possible to treat both the time data simultaneously and effectively. We investigate the dependence of test-execution time as a testing effort on the software reliability assessment, and validate quantitatively the software reliability models with two-time scales. We also consider an optimization problem when to stop the software testing in terms of two-time measurements","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134237234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
SEVA: A Soft-Error- and Variation-Aware Cache Architecture 一种软错误和变化感知缓存体系结构
L. D. Hung, M. Goshima, S. Sakai
As SRAM devices are scaled down, the number of variation-induced defective memory cells increases rapidly. Combination of ECC, particularly SECDED, with a redundancy technique can effectively tolerate a high number of defects. While SECDED can repair a defective cell in a block, the block becomes vulnerable to soft errors. This paper proposes SEVA, an original soft-error- and variation-aware cache architecture. SEVA exploits SECDED to tolerate variation-induced defects while preserving high resilience against soft errors. Information about the defectiveness and data dirtiness is maintained for each SECDED block. SEVA allows only the clean data to be stored in defective (but still usable) blocks of a cache. An error occurring in a defective block can be detected and the correct data can be obtained from the lower level of the memory hierarchy. SEVA improves yield and reliability with low overheads
随着SRAM器件的小型化,变化诱导的缺陷存储细胞的数量迅速增加。结合ECC,特别是SECDED,与冗余技术可以有效地容忍大量的缺陷。虽然SECDED可以修复块中有缺陷的细胞,但块容易受到软错误的影响。本文提出了一种原始的软错误和变化感知缓存体系结构SEVA。SEVA利用SECDED来容忍变化引起的缺陷,同时保持对软错误的高弹性。每个SECDED块都维护有关缺陷和数据污染的信息。SEVA只允许干净的数据存储在缓存的有缺陷(但仍然可用)的块中。在有缺陷的块中发生的错误可以被检测到,并且可以从内存层次结构的较低级别获得正确的数据。SEVA以较低的开销提高了产量和可靠性
{"title":"SEVA: A Soft-Error- and Variation-Aware Cache Architecture","authors":"L. D. Hung, M. Goshima, S. Sakai","doi":"10.1109/PRDC.2006.56","DOIUrl":"https://doi.org/10.1109/PRDC.2006.56","url":null,"abstract":"As SRAM devices are scaled down, the number of variation-induced defective memory cells increases rapidly. Combination of ECC, particularly SECDED, with a redundancy technique can effectively tolerate a high number of defects. While SECDED can repair a defective cell in a block, the block becomes vulnerable to soft errors. This paper proposes SEVA, an original soft-error- and variation-aware cache architecture. SEVA exploits SECDED to tolerate variation-induced defects while preserving high resilience against soft errors. Information about the defectiveness and data dirtiness is maintained for each SECDED block. SEVA allows only the clean data to be stored in defective (but still usable) blocks of a cache. An error occurring in a defective block can be detected and the correct data can be obtained from the lower level of the memory hierarchy. SEVA improves yield and reliability with low overheads","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"476 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133498781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Implementation Results of a Configurable Membership Protocol for Active Safety Systems 主动安全系统中可配置成员协议的实现结果
C. Bergenhem, J. Karlsson, C. Archer, Andreas Sjoblom
This paper describes a configurable membership protocol for distributed tasks in time-triggered systems that combine static and dynamic messages such as TTCAN or Flexray. The units of membership are processes in nodes that send messages in static communication slots. The objective is to give nodes a consistent view of the status of processes in the system. Process failures are assumed to be manifested as missing messages (fail-silent assumption). Whenever a node detects a change in the membership status of any process, it broadcasts its opinion about the membership status of all processes. This information is broadcast only by nodes that detect a change of local membership status. The protocol is implemented in a distributed embedded system with TTCAN-communication. The response-time of the protocol has been evaluated experimentally by means of fault injection
本文描述了时间触发系统中分布式任务的可配置成员协议,该系统结合了静态和动态消息(如TTCAN或Flexray)。成员单位是在静态通信槽中发送消息的节点中的进程。目标是为节点提供系统中进程状态的一致视图。假设流程失败表现为丢失消息(失败沉默假设)。每当节点检测到任何进程的成员状态发生变化时,它就广播其关于所有进程的成员状态的意见。此信息仅由检测到本地成员状态变化的节点广播。该协议在具有ttcan通信的分布式嵌入式系统中实现。采用故障注入的方法对协议的响应时间进行了实验评估
{"title":"Implementation Results of a Configurable Membership Protocol for Active Safety Systems","authors":"C. Bergenhem, J. Karlsson, C. Archer, Andreas Sjoblom","doi":"10.1109/PRDC.2006.37","DOIUrl":"https://doi.org/10.1109/PRDC.2006.37","url":null,"abstract":"This paper describes a configurable membership protocol for distributed tasks in time-triggered systems that combine static and dynamic messages such as TTCAN or Flexray. The units of membership are processes in nodes that send messages in static communication slots. The objective is to give nodes a consistent view of the status of processes in the system. Process failures are assumed to be manifested as missing messages (fail-silent assumption). Whenever a node detects a change in the membership status of any process, it broadcasts its opinion about the membership status of all processes. This information is broadcast only by nodes that detect a change of local membership status. The protocol is implemented in a distributed embedded system with TTCAN-communication. The response-time of the protocol has been evaluated experimentally by means of fault injection","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124068069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1