首页 > 最新文献

2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)最新文献

英文 中文
Exploring error-tolerant low-power multiple-output read scheme for memristor-based memory arrays 基于忆阻器的存储器阵列的容错低功耗多输出读方案研究
Adedotun Adeyemo, J. Mathew, A. Jabir, D. Pradhan
In an effort to reduce the overall read/write power consumption in emerging memory technologies, efficient read/write schemes have recently attracted increased attention. Among these emerging technologies is the memristor-based resistive random access memory (ReRAM) with simpler structures and capability of producing highly dense memory through the sneak-path prone crossbar architecture. In this paper, a multiple-cells read solution to reduce the overall energy consumption when reading from a memory array is considered. A closed form expression for the noise margin effect is derived and analysis shows that there is zero sneak-path when sensing certain patterns of stored data. The multiple-cells readout method was thus used to analyse an energy efficient Inverted-Hamming (I-H) architecture capable of detecting and correcting single-bit write error in memristor-based memory array.
为了降低新兴内存技术的总体读/写功耗,高效的读/写方案最近引起了越来越多的关注。在这些新兴技术中,基于忆阻器的电阻式随机存取存储器(ReRAM)结构更简单,并且能够通过易于隐蔽路径的交叉栅结构产生高密度存储器。本文考虑了一种多单元读取方案,以减少从存储器阵列读取时的总能耗。推导了噪声裕度效应的封闭表达式,分析表明,在感知存储数据的某些模式时,存在零潜径。因此,多单元读出方法被用于分析一种节能的倒汉明(I-H)架构,该架构能够检测和纠正基于忆阻器的存储阵列中的单比特写入错误。
{"title":"Exploring error-tolerant low-power multiple-output read scheme for memristor-based memory arrays","authors":"Adedotun Adeyemo, J. Mathew, A. Jabir, D. Pradhan","doi":"10.1109/DFT.2015.7315129","DOIUrl":"https://doi.org/10.1109/DFT.2015.7315129","url":null,"abstract":"In an effort to reduce the overall read/write power consumption in emerging memory technologies, efficient read/write schemes have recently attracted increased attention. Among these emerging technologies is the memristor-based resistive random access memory (ReRAM) with simpler structures and capability of producing highly dense memory through the sneak-path prone crossbar architecture. In this paper, a multiple-cells read solution to reduce the overall energy consumption when reading from a memory array is considered. A closed form expression for the noise margin effect is derived and analysis shows that there is zero sneak-path when sensing certain patterns of stored data. The multiple-cells readout method was thus used to analyse an energy efficient Inverted-Hamming (I-H) architecture capable of detecting and correcting single-bit write error in memristor-based memory array.","PeriodicalId":383972,"journal":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130170596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scan attack on Elliptic Curve Cryptosystem 椭圆曲线密码系统的扫描攻击
Subidh Ali, O. Sinanoglu
We present a new scan attack on hardware implementation of Elliptic Curve Cryptography (ECC), a representative public key cipher. The existing scan attacks on ECC exploit the Design for Testability (DfT) infrastructure of the implementation to identify the internal registers used in the scalar multiplication, and leak the secret key based on a bit-flip analysis in the scalar multiplication registers. These attacks assume two internal registers are affected by the secret key in the ECC. In practical implementations, multiple internal registers are affected by the secret key, significantly complicating the identification of the targeted registers. Furthermore, existing scan attacks rely on a switch from normal to test mode, fail against the widely utilized mode-reset countermeasure. The proposed attack identifies the internal registers in a depth-first search fashion, where registers corresponding to the innermost module of the hardware design are identified first. This attack identifies all the registers related to the secret key, and does so by remaining only in the test mode, thus overcoming both limitations of the existing scan attacks.
针对具有代表性的公钥密码——椭圆曲线密码(ECC)的硬件实现,提出了一种新的扫描攻击。现有的针对ECC的扫描攻击利用可测试性设计(DfT)基础架构来识别用于标量乘法的内部寄存器,并基于标量乘法寄存器中的位翻转分析泄露密钥。这些攻击假设两个内部寄存器受到ECC中的秘钥的影响。在实际实现中,多个内部寄存器受到密钥的影响,从而使目标寄存器的识别变得非常复杂。此外,现有的扫描攻击依赖于从正常模式到测试模式的切换,无法对抗广泛使用的模式重置对策。提出的攻击以深度优先的搜索方式识别内部寄存器,其中首先识别与硬件设计最内层模块对应的寄存器。这种攻击识别与密钥相关的所有寄存器,并通过仅保持在测试模式来实现,从而克服了现有扫描攻击的两个限制。
{"title":"Scan attack on Elliptic Curve Cryptosystem","authors":"Subidh Ali, O. Sinanoglu","doi":"10.1109/DFT.2015.7315146","DOIUrl":"https://doi.org/10.1109/DFT.2015.7315146","url":null,"abstract":"We present a new scan attack on hardware implementation of Elliptic Curve Cryptography (ECC), a representative public key cipher. The existing scan attacks on ECC exploit the Design for Testability (DfT) infrastructure of the implementation to identify the internal registers used in the scalar multiplication, and leak the secret key based on a bit-flip analysis in the scalar multiplication registers. These attacks assume two internal registers are affected by the secret key in the ECC. In practical implementations, multiple internal registers are affected by the secret key, significantly complicating the identification of the targeted registers. Furthermore, existing scan attacks rely on a switch from normal to test mode, fail against the widely utilized mode-reset countermeasure. The proposed attack identifies the internal registers in a depth-first search fashion, where registers corresponding to the innermost module of the hardware design are identified first. This attack identifies all the registers related to the secret key, and does so by remaining only in the test mode, thus overcoming both limitations of the existing scan attacks.","PeriodicalId":383972,"journal":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127675404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A BIST approach for counterfeit circuit detection based on NBTI degradation 基于NBTI退化的BIST伪电路检测方法
Puneet Ramesh Savanur, Phaninder Alladi, S. Tragoudas
This paper presents a simple BIST enhancement to detect counterfeit circuits which experience aging delays. The approach is based on the NBTI aging factor. HSPICE simulations on 45nm and 65nm technologies using a predictive NBTI degradation model are presented. The results indicate that counterfeit circuits undergone minimal stress are detected consistently in the presence of process variations.
本文提出了一种简单的BIST增强方法来检测具有老化延迟的假冒电路。该方法基于NBTI老化因子。采用预测NBTI降解模型对45nm和65nm工艺进行了HSPICE仿真。结果表明,在存在工艺变化的情况下,经过最小应力的伪造电路始终被检测到。
{"title":"A BIST approach for counterfeit circuit detection based on NBTI degradation","authors":"Puneet Ramesh Savanur, Phaninder Alladi, S. Tragoudas","doi":"10.1109/DFT.2015.7315148","DOIUrl":"https://doi.org/10.1109/DFT.2015.7315148","url":null,"abstract":"This paper presents a simple BIST enhancement to detect counterfeit circuits which experience aging delays. The approach is based on the NBTI aging factor. HSPICE simulations on 45nm and 65nm technologies using a predictive NBTI degradation model are presented. The results indicate that counterfeit circuits undergone minimal stress are detected consistently in the presence of process variations.","PeriodicalId":383972,"journal":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134019310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Predictive LBIST model and partial ATPG for seed extraction 种子提取的预测LBIST模型和部分ATPG
Gustavo K. Contreras, N. Ahmed, L. Winemberg, M. Tehranipoor
Integrated circuits used in critical and high reliability applications have often strict test requirements including high test coverage and limited test time. Achieving a high test coverage using built-in self-test (BIST) has proven difficult. Methods such as test point insertion or deterministic BIST can provide high test coverage but introduce significant area overhead and design effort. In this paper, we propose a computational algorithm that uses a linear XOR model of the logic BIST (LBIST) structure and fault partitioning to extract seeds for partial ATPG patterns. Partial ATPG patterns are used to decrease the complexity of the algorithm when solving linear XOR equations to generate deterministic seeds. The extracted seeds are stored in a nonvolatile memory on- or off-chip. Results show that for most designs, patterns generated from the extracted ATPG seeds are significantly more effective in detecting faults and can achieve higher test coverage than LBIST.
用于关键和高可靠性应用的集成电路通常具有严格的测试要求,包括高测试覆盖率和有限的测试时间。使用内置自测(BIST)实现高测试覆盖率已被证明是困难的。测试点插入或确定性BIST等方法可以提供较高的测试覆盖率,但会引入大量的面积开销和设计工作。本文提出了一种利用逻辑BIST (LBIST)结构的线性异或模型和故障划分来提取部分ATPG模式种子的计算算法。在求解线性异或方程生成确定性种子时,采用部分ATPG模式来降低算法的复杂度。提取的种子存储在芯片内或芯片外的非易失性存储器中。结果表明,对于大多数设计,由提取的ATPG种子生成的模式在检测故障方面明显比LBIST更有效,并且可以实现更高的测试覆盖率。
{"title":"Predictive LBIST model and partial ATPG for seed extraction","authors":"Gustavo K. Contreras, N. Ahmed, L. Winemberg, M. Tehranipoor","doi":"10.1109/DFT.2015.7315151","DOIUrl":"https://doi.org/10.1109/DFT.2015.7315151","url":null,"abstract":"Integrated circuits used in critical and high reliability applications have often strict test requirements including high test coverage and limited test time. Achieving a high test coverage using built-in self-test (BIST) has proven difficult. Methods such as test point insertion or deterministic BIST can provide high test coverage but introduce significant area overhead and design effort. In this paper, we propose a computational algorithm that uses a linear XOR model of the logic BIST (LBIST) structure and fault partitioning to extract seeds for partial ATPG patterns. Partial ATPG patterns are used to decrease the complexity of the algorithm when solving linear XOR equations to generate deterministic seeds. The extracted seeds are stored in a nonvolatile memory on- or off-chip. Results show that for most designs, patterns generated from the extracted ATPG seeds are significantly more effective in detecting faults and can achieve higher test coverage than LBIST.","PeriodicalId":383972,"journal":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133984013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Characterization of low power radiation-hard reed-solomon code protected serializers in 65-nm for HEP experiments electronics HEP实验电子学低功率辐射硬芦苇-所罗门码保护的65纳米串行化器的特性
D. Felici, S. Bonacini, M. Ottavi
The availability of low-power, radiation-resistant components has an enormous importance in the development of the electronic systems for modern detectors in a High Energy Physics (HEP) experiment. This paper describes the characterization in terms of radiation effects of two serializer blocks within a high speed transmitter, prior developed with the objective of achieving a power consumption of less than 30 mW at the operating speed of 4.8 Gbit/sec. Within the first serializer, called “simple TMR”, a traditional solution, based on the hardware redundancy, has been implemented. In the second case a new architecture, less power consuming, called “code protected”, has been proposed. The tests previously performed shown an average consumption of ~30 mW and ~19 mW, respectively, for a bit rate of 4.8 Gbit/sec but do not fully clarify if the blocks are suitable for working under extremely high radiation levels. Hence, a deep radiation hardness investigation has been performed and presented here to confirm the availability of these blocks in a HEP electronic system. SEU sensitivities are measured and bit error rates better than 2 E-15 are obtained, confirming that the “code protected” solution assures reliable communications in HEP experiments environment with a smaller power consumption. These blocks have also been designed and tested to cope with a total ionizing dose of 100 Mrad over 10 years of operation.
在高能物理(HEP)实验中,低功率、抗辐射元件的可用性对现代探测器电子系统的发展具有极其重要的意义。本文描述了高速发射机内两个串行块的辐射效应特性,该发射机先前开发的目标是在4.8 Gbit/sec的运行速度下实现低于30 mW的功耗。在第一个序列化器(称为“简单TMR”)中,已经实现了基于硬件冗余的传统解决方案。在第二种情况下,提出了一种新的架构,称为“代码保护”,功耗更低。先前进行的测试显示,在比特率为4.8 Gbit/sec的情况下,平均功耗分别为~30 mW和~19 mW,但没有完全阐明这些模块是否适合在极高的辐射水平下工作。因此,进行了深入的辐射硬度调查,并在此提出,以确认这些块在HEP电子系统中的可用性。测量了SEU的灵敏度,获得了优于2 E-15的误码率,证实了“码保护”解决方案在HEP实验环境下以更小的功耗保证了可靠的通信。经过设计和测试,这些区块在10年的运行中可以承受100毫当量的总电离剂量。
{"title":"Characterization of low power radiation-hard reed-solomon code protected serializers in 65-nm for HEP experiments electronics","authors":"D. Felici, S. Bonacini, M. Ottavi","doi":"10.1109/DFT.2015.7315160","DOIUrl":"https://doi.org/10.1109/DFT.2015.7315160","url":null,"abstract":"The availability of low-power, radiation-resistant components has an enormous importance in the development of the electronic systems for modern detectors in a High Energy Physics (HEP) experiment. This paper describes the characterization in terms of radiation effects of two serializer blocks within a high speed transmitter, prior developed with the objective of achieving a power consumption of less than 30 mW at the operating speed of 4.8 Gbit/sec. Within the first serializer, called “simple TMR”, a traditional solution, based on the hardware redundancy, has been implemented. In the second case a new architecture, less power consuming, called “code protected”, has been proposed. The tests previously performed shown an average consumption of ~30 mW and ~19 mW, respectively, for a bit rate of 4.8 Gbit/sec but do not fully clarify if the blocks are suitable for working under extremely high radiation levels. Hence, a deep radiation hardness investigation has been performed and presented here to confirm the availability of these blocks in a HEP electronic system. SEU sensitivities are measured and bit error rates better than 2 E-15 are obtained, confirming that the “code protected” solution assures reliable communications in HEP experiments environment with a smaller power consumption. These blocks have also been designed and tested to cope with a total ionizing dose of 100 Mrad over 10 years of operation.","PeriodicalId":383972,"journal":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129733915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reducing the performance overhead of resilient CMPs with substitutable resources 使用可替代资源减少弹性cmp的性能开销
A. Malek, S. Tzilis, D. Khan, I. Sourdis, Georgios Smaragdos, C. Strydis
Permanent faults on a chip are often tolerated using spare resources. In the past, sparing has been applied to Chip Multiprocessors (CMPs) at various granularities of substitutable units (SUs). Entire processors, pipeline stages or even individual functional units are isolated when faulty and replaced by spare ones using flexible, reconfigurable interconnects. Although spare resources increase systems fault tolerance, the extra delay imposed by the reconfigurable interconnects limits performance. In this paper, we study two options for dealing with this delay: (i) pipelining the reconfigurable interconnects and (ii) scaling down operating frequency. The former keeps a frequency close to the one of the baseline processor, but increases the number of cycles required for executing a program. The latter maintains the number of execution cycles constant, but requires a slower clock. We investigate the above performance tradeoff using an adaptive 4-core CMP design with substitutable pipeline stages. We retrieve post place and route results of different designs running two sets of benchmarks and evaluate their performance. Our experiments indicate that adding reconfigurable interconnects for wiring the SUs of a 4-core CMP pose significant delay increasing the critical path of the design almost by 3.5 times. On the other hand, pipelining the reconfigurable interconnects increases cycle time by 41% and - depending on the processor configuration - reduces performance overhead to 1.4-2.9× the execution time of the baseline.
芯片上的永久故障通常可以使用备用资源来容忍。在过去,节约已应用于芯片多处理器(cmp)在不同粒度的可替代单元(su)。当出现故障时,整个处理器、流水线阶段甚至单个功能单元都是隔离的,并使用灵活的、可重构的互连来替换备用部件。虽然备用资源增加了系统容错性,但可重构互连带来的额外延迟限制了性能。在本文中,我们研究了处理这种延迟的两种选择:(i)管道化可重构互连和(ii)降低工作频率。前者保持一个接近基线处理器的频率,但增加了执行程序所需的周期数。后者保持执行周期的数量不变,但需要一个较慢的时钟。我们使用具有可替换管道级的自适应4核CMP设计来研究上述性能权衡。我们检索了不同设计的post place和route结果,运行两组基准并评估其性能。我们的实验表明,在4核CMP的su布线中添加可重构互连会造成明显的延迟,将设计的关键路径增加了近3.5倍。另一方面,流水线化可重构互连增加了41%的周期时间,并且(取决于处理器配置)将性能开销降低到基准执行时间的1.4-2.9倍。
{"title":"Reducing the performance overhead of resilient CMPs with substitutable resources","authors":"A. Malek, S. Tzilis, D. Khan, I. Sourdis, Georgios Smaragdos, C. Strydis","doi":"10.1109/DFT.2015.7315161","DOIUrl":"https://doi.org/10.1109/DFT.2015.7315161","url":null,"abstract":"Permanent faults on a chip are often tolerated using spare resources. In the past, sparing has been applied to Chip Multiprocessors (CMPs) at various granularities of substitutable units (SUs). Entire processors, pipeline stages or even individual functional units are isolated when faulty and replaced by spare ones using flexible, reconfigurable interconnects. Although spare resources increase systems fault tolerance, the extra delay imposed by the reconfigurable interconnects limits performance. In this paper, we study two options for dealing with this delay: (i) pipelining the reconfigurable interconnects and (ii) scaling down operating frequency. The former keeps a frequency close to the one of the baseline processor, but increases the number of cycles required for executing a program. The latter maintains the number of execution cycles constant, but requires a slower clock. We investigate the above performance tradeoff using an adaptive 4-core CMP design with substitutable pipeline stages. We retrieve post place and route results of different designs running two sets of benchmarks and evaluate their performance. Our experiments indicate that adding reconfigurable interconnects for wiring the SUs of a 4-core CMP pose significant delay increasing the critical path of the design almost by 3.5 times. On the other hand, pipelining the reconfigurable interconnects increases cycle time by 41% and - depending on the processor configuration - reduces performance overhead to 1.4-2.9× the execution time of the baseline.","PeriodicalId":383972,"journal":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","volume":"7 9‐10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120859721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cross-layer approach to online adaptive reliability prediction of transient faults 一种跨层的暂态故障在线自适应可靠性预测方法
Bahareh J. Farahani, S. Safari
As the semiconductor industry migrates into the nanometer regime, processors become increasingly susceptible to transient faults. Such faults usually stem either from soft errors due to particle strikes or timing violations due to Process, Voltage, Temperature, and Aging (PVTA) variations. These faults can propagate from circuit-level to application-level and alter the correct execution output of the application. For generations, designers build high-level resiliency such that the details of the underlying circuit are an abstraction that could be neglected. This paper argues that in contrast to the prior work, which only take into account Architectural Vulnerability Factor (AVF) as a measure to guide fault tolerant techniques, the vulnerability of each abstraction layer of design stack from circuit going up to instruction and application layers should be considered. This paper presents a novel online cross-layer reliability prediction technique based on learning algorithms which can anticipate the susceptibility of the processor considering both lower-level and higher-level details in an adaptive fashion. According to the results, the proposed technique can predict the future reliability with 6% error on average across SPEC2000 benchmarks. Our technique by forecasting the reliability emergencies can assist proactive fault tolerant techniques to maintain the reliability constraints more efficiently in comparison to reactive strategies.
随着半导体工业向纳米领域迁移,处理器越来越容易受到瞬态故障的影响。此类故障通常源于粒子撞击引起的软错误或工艺、电压、温度和老化(PVTA)变化引起的时序违规。这些故障可以从电路级传播到应用程序级,并改变应用程序的正确执行输出。几代人以来,设计师都在构建高级的弹性,使得底层电路的细节成为可以忽略的抽象概念。本文认为,与以往只考虑架构脆弱性系数(AVF)作为指导容错技术的度量不同,应该考虑设计堆栈中从电路层到指令层和应用层的每个抽象层的脆弱性。本文提出了一种基于学习算法的在线跨层可靠性预测技术,该技术可以自适应地同时考虑较低层次和较高层次的细节来预测处理器的易感性。结果表明,该方法在SPEC2000基准测试中预测未来可靠性的平均误差为6%。与被动容错策略相比,我们的可靠性突发事件预测技术可以帮助主动容错技术更有效地维护可靠性约束。
{"title":"A cross-layer approach to online adaptive reliability prediction of transient faults","authors":"Bahareh J. Farahani, S. Safari","doi":"10.1109/DFT.2015.7315165","DOIUrl":"https://doi.org/10.1109/DFT.2015.7315165","url":null,"abstract":"As the semiconductor industry migrates into the nanometer regime, processors become increasingly susceptible to transient faults. Such faults usually stem either from soft errors due to particle strikes or timing violations due to Process, Voltage, Temperature, and Aging (PVTA) variations. These faults can propagate from circuit-level to application-level and alter the correct execution output of the application. For generations, designers build high-level resiliency such that the details of the underlying circuit are an abstraction that could be neglected. This paper argues that in contrast to the prior work, which only take into account Architectural Vulnerability Factor (AVF) as a measure to guide fault tolerant techniques, the vulnerability of each abstraction layer of design stack from circuit going up to instruction and application layers should be considered. This paper presents a novel online cross-layer reliability prediction technique based on learning algorithms which can anticipate the susceptibility of the processor considering both lower-level and higher-level details in an adaptive fashion. According to the results, the proposed technique can predict the future reliability with 6% error on average across SPEC2000 benchmarks. Our technique by forecasting the reliability emergencies can assist proactive fault tolerant techniques to maintain the reliability constraints more efficiently in comparison to reactive strategies.","PeriodicalId":383972,"journal":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122995956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Dual-Layer Fault Manager for systems based on Xilinx Virtex FPGAs 基于Xilinx Virtex fpga的系统双层故障管理器
I. Herrera-Alzu, M. López-Vallejo, C. G. Soriano
Systems based on Xilinx Virtex series FPGAs can benefit, compared to traditional rad-hard technologies, from high performance, high logic density and dynamic reconfiguration capability. However, the underlying SRAM technology is sensitive to ionizing radiation, which can induce faults that must be managed to improve system's dependability. This paper proposes a Dual-Layer Fault Manager concept, which aims at managing both configuration and application faults, dynamically balancing redundancy level, dependability and functionality. This concept has been prototyped and its initial test results are discussed.
与传统的防硬技术相比,基于Xilinx Virtex系列fpga的系统可以从高性能、高逻辑密度和动态重构能力中获益。然而,SRAM的底层技术对电离辐射很敏感,电离辐射可能引发故障,必须对故障进行管理以提高系统的可靠性。本文提出了一种双层故障管理器的概念,该概念旨在同时管理配置和应用故障,动态平衡冗余级别、可靠性和功能。这个概念已经原型化,并讨论了它的初步测试结果。
{"title":"A Dual-Layer Fault Manager for systems based on Xilinx Virtex FPGAs","authors":"I. Herrera-Alzu, M. López-Vallejo, C. G. Soriano","doi":"10.1109/DFT.2015.7315138","DOIUrl":"https://doi.org/10.1109/DFT.2015.7315138","url":null,"abstract":"Systems based on Xilinx Virtex series FPGAs can benefit, compared to traditional rad-hard technologies, from high performance, high logic density and dynamic reconfiguration capability. However, the underlying SRAM technology is sensitive to ionizing radiation, which can induce faults that must be managed to improve system's dependability. This paper proposes a Dual-Layer Fault Manager concept, which aims at managing both configuration and application faults, dynamically balancing redundancy level, dependability and functionality. This concept has been prototyped and its initial test results are discussed.","PeriodicalId":383972,"journal":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127041113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single Event Upsets and Hot Pixels in digital imagers 数字成像仪中的单事件干扰和热像素
G. Chapman, Rahul Thomas, Rohan Thomas, Klinsmann J. Coelho Silva Meneses, Tommy Q. Yang, I. Koren, Z. Koren
From extensive study of digital imager defects, we found that permanent “Hot Pixels” are the main long term digital camera defects, and are caused by high energy cosmic ray particles. Clearly, as in other microelectronic integrated circuits, most of the particles do not induce permanent damage but instead, inject a short term charge that may cause a transient fault, known as a Single Event Upset (SEU). Unlike standard digital ICs, pixels in a digital imaging sensor can be monitored at almost any desirable frequency. Since an SEU manifests itself as one or more brighter pixels in an otherwise dark image, the rate of SEUs can be measured at a considerably higher accuracy by taking dark-field pictures at different exposure times and different frequencies. In this paper we describe an experimental approach to measuring the occurrence rate and resulting characteristics of SEUs. The SEU rate that we have observed for digital imagers, of about 4 SEUs for every 30 seconds, is considerably higher than was previously reported for ordinary ICs. For the same imager, permanent hot pixels have a rate of 1 every 12.6 days, while SEUs occur 145,000 times more often. Ordinary IC SEU rates have been reported to be about 100× of permanent fault rates. In addition, we found that some SEUs in digital imagers do not impact a single pixel, as do hot pixels, but can create a line of injected charges which appears as a bright line in the dark image.
通过对数码成像仪缺陷的广泛研究,我们发现永久性的“热像素”是数码相机主要的长期缺陷,它是由高能宇宙射线粒子引起的。显然,与其他微电子集成电路一样,大多数粒子不会造成永久性损坏,而是注入短期电荷,可能导致瞬态故障,即所谓的单事件扰动(SEU)。与标准数字集成电路不同,数字成像传感器中的像素几乎可以在任何期望的频率下进行监测。由于单亮度单位表现为在暗图像中显示一个或多个更亮的像素,因此通过在不同曝光时间和不同频率下拍摄暗场图像,可以以相当高的精度测量单亮度单位的速率。在本文中,我们描述了一种实验方法来测量seu的发生率和产生的特性。我们在数字成像仪上观察到的SEU速率为每30秒约4 SEU,远远高于之前报道的普通ic。对于相同的成像仪,永久热像素的频率为每12.6天1次,而seu的频率为14.5万倍。据报道,普通IC的SEU率约为永久故障率的100倍。此外,我们发现数字成像仪中的一些seu不会像热像素那样影响单个像素,但会产生一条注入电荷线,在暗图像中显示为一条亮线。
{"title":"Single Event Upsets and Hot Pixels in digital imagers","authors":"G. Chapman, Rahul Thomas, Rohan Thomas, Klinsmann J. Coelho Silva Meneses, Tommy Q. Yang, I. Koren, Z. Koren","doi":"10.1109/DFT.2015.7315133","DOIUrl":"https://doi.org/10.1109/DFT.2015.7315133","url":null,"abstract":"From extensive study of digital imager defects, we found that permanent “Hot Pixels” are the main long term digital camera defects, and are caused by high energy cosmic ray particles. Clearly, as in other microelectronic integrated circuits, most of the particles do not induce permanent damage but instead, inject a short term charge that may cause a transient fault, known as a Single Event Upset (SEU). Unlike standard digital ICs, pixels in a digital imaging sensor can be monitored at almost any desirable frequency. Since an SEU manifests itself as one or more brighter pixels in an otherwise dark image, the rate of SEUs can be measured at a considerably higher accuracy by taking dark-field pictures at different exposure times and different frequencies. In this paper we describe an experimental approach to measuring the occurrence rate and resulting characteristics of SEUs. The SEU rate that we have observed for digital imagers, of about 4 SEUs for every 30 seconds, is considerably higher than was previously reported for ordinary ICs. For the same imager, permanent hot pixels have a rate of 1 every 12.6 days, while SEUs occur 145,000 times more often. Ordinary IC SEU rates have been reported to be about 100× of permanent fault rates. In addition, we found that some SEUs in digital imagers do not impact a single pixel, as do hot pixels, but can create a line of injected charges which appears as a bright line in the dark image.","PeriodicalId":383972,"journal":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131638007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles IntelliCAN:针对安全汽车的防攻击控制器区域网络(CAN)
Mohammad Raashid Ansari, Shucheng Yu, Qiaoyan Yu
Controller Area Network (CAN) is the main bus network that connects electronic control units in automobiles. Although CAN protocols have been revised to improve the vehicle safety, the security weaknesses of CAN have not been fully addressed. Security threats on automobiles might be from external wireless communication or from internal malicious CAN nodes mounted on the CAN bus. Despite of various threat sources, the security weakness of CAN is the root of security problems. Due to the limited computation power and storage capacity on each CAN node, there is a lack of hardware-efficient protection methods for the CAN system without losing the compatibility to CAN protocols. To save the cost and maintain the compatibility, we propose to exploit the built-in CAN fault confinement mechanism to detect the masquerade attacks originated from the malicious CAN devices on the CAN bus. Simulation results show that our method achieves the attack misdetection rate at the order of 10-5 and reduces the encryption latency by up to 68% over the complete frame encryption method.
控制器局域网(CAN)是连接汽车电子控制单元的主要总线网络。虽然CAN协议已被修订以提高车辆的安全性,但CAN的安全弱点尚未得到充分解决。汽车的安全威胁可能来自外部无线通信,也可能来自安装在CAN总线上的内部恶意CAN节点。尽管威胁来源多种多样,但CAN的安全弱点是安全问题的根源。由于每个CAN节点的计算能力和存储容量有限,在保证CAN协议兼容性的前提下,缺乏硬件高效的CAN系统保护方法。为了节省成本和保持兼容性,我们提出利用内置的CAN故障约束机制来检测来自CAN总线上恶意CAN设备的伪装攻击。仿真结果表明,与全帧加密方法相比,该方法实现了10-5量级的攻击误检率,并将加密延迟降低了68%。
{"title":"IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles","authors":"Mohammad Raashid Ansari, Shucheng Yu, Qiaoyan Yu","doi":"10.1109/DFT.2015.7315168","DOIUrl":"https://doi.org/10.1109/DFT.2015.7315168","url":null,"abstract":"Controller Area Network (CAN) is the main bus network that connects electronic control units in automobiles. Although CAN protocols have been revised to improve the vehicle safety, the security weaknesses of CAN have not been fully addressed. Security threats on automobiles might be from external wireless communication or from internal malicious CAN nodes mounted on the CAN bus. Despite of various threat sources, the security weakness of CAN is the root of security problems. Due to the limited computation power and storage capacity on each CAN node, there is a lack of hardware-efficient protection methods for the CAN system without losing the compatibility to CAN protocols. To save the cost and maintain the compatibility, we propose to exploit the built-in CAN fault confinement mechanism to detect the masquerade attacks originated from the malicious CAN devices on the CAN bus. Simulation results show that our method achieves the attack misdetection rate at the order of 10-5 and reduces the encryption latency by up to 68% over the complete frame encryption method.","PeriodicalId":383972,"journal":{"name":"2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","volume":"18 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1