Venu Babu Thati, J. Vankeirsbilck, J. Boydens, D. Pissoort
{"title":"数据流错误检测的选择性复制和选择性比较","authors":"Venu Babu Thati, J. Vankeirsbilck, J. Boydens, D. Pissoort","doi":"10.1109/ICSRS48664.2019.8987731","DOIUrl":null,"url":null,"abstract":"Embedded systems' hardware can be impacted by soft errors, which can cause data flow errors in the systems' software. In this paper, we present a novel software-based approach to counter data flow errors, called Selective Duplication and Selective Comparison (SDSC). First, we validated our SDSC technique by implementing it for six case studies and submitting it to a fault injection campaign. Next, we measured its execution time overhead. To put the measured results into perspective, we compared them to those of two established techniques, called Critical Block Duplication (CBD) and near Zero silent Data Corruption (nZDC). The results show that our SDSC technique has a higher error detection ratio with a lower silent data corruption compared to both the CBD and nZDC techniques. This does, however, come with a slightly higher execution time overhead.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Selective Duplication and Selective Comparison for Data Flow Error Detection\",\"authors\":\"Venu Babu Thati, J. Vankeirsbilck, J. Boydens, D. Pissoort\",\"doi\":\"10.1109/ICSRS48664.2019.8987731\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Embedded systems' hardware can be impacted by soft errors, which can cause data flow errors in the systems' software. In this paper, we present a novel software-based approach to counter data flow errors, called Selective Duplication and Selective Comparison (SDSC). First, we validated our SDSC technique by implementing it for six case studies and submitting it to a fault injection campaign. Next, we measured its execution time overhead. To put the measured results into perspective, we compared them to those of two established techniques, called Critical Block Duplication (CBD) and near Zero silent Data Corruption (nZDC). The results show that our SDSC technique has a higher error detection ratio with a lower silent data corruption compared to both the CBD and nZDC techniques. This does, however, come with a slightly higher execution time overhead.\",\"PeriodicalId\":430931,\"journal\":{\"name\":\"2019 4th International Conference on System Reliability and Safety (ICSRS)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 4th International Conference on System Reliability and Safety (ICSRS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSRS48664.2019.8987731\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 4th International Conference on System Reliability and Safety (ICSRS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSRS48664.2019.8987731","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Selective Duplication and Selective Comparison for Data Flow Error Detection
Embedded systems' hardware can be impacted by soft errors, which can cause data flow errors in the systems' software. In this paper, we present a novel software-based approach to counter data flow errors, called Selective Duplication and Selective Comparison (SDSC). First, we validated our SDSC technique by implementing it for six case studies and submitting it to a fault injection campaign. Next, we measured its execution time overhead. To put the measured results into perspective, we compared them to those of two established techniques, called Critical Block Duplication (CBD) and near Zero silent Data Corruption (nZDC). The results show that our SDSC technique has a higher error detection ratio with a lower silent data corruption compared to both the CBD and nZDC techniques. This does, however, come with a slightly higher execution time overhead.