Recent increase of transient fault rates has made processor reliability a major concern. Moreover performance improvements are required for many of today\u27s embedded systems. At the same time software implemented fault detection remains the only option for off-the-shelf processors. Software methods, however, introduce significant performance overheads due to the additional instructions required for the detection. A good observation is that often code segments not susceptible to faults are protected. In this paper we propose a technique for systematic analysis of the bit-flip effects on the program controlflow in order to identify only those locations susceptible to controlflow errors and hence minimize the number of fault detection assert...
Bit flips are known to be a source of strange system behavior, failures, and crashes. They can cause...
Embedded systems used in harsh environments are susceptible to bit-flips, which can cause data flow ...
A popular software attack on a program is by transferring the program control to malicious code inse...
In modern safety-critical embedded systems reliability and performance are two important criteria. I...
Increasing design complexity for current and future generations of microelectronic technologies lead...
Software-based methods for the detection of control-flow errors caused by transient fault usually co...
Today, embedded systems are being used in many (safety-critical) applications. However, due to their...
In this paper we study the impact of compiler optimizations on the error sensitivity of twelve bench...
This paper presents the results of an extensive experimental study of bit-flip errors in instruction...
This paper presents the results of an extensive fault injection study of the impact of processor fau...
Shrinking microprocessor feature size and growing transistor density may increase the soft-error rat...
Software-based fault tolerance techniques are a low-cost way to protect processors against soft erro...
International audienceThis-paper characterizes the effectiveness of an error detection technique tha...
The improvement of dependability in computing systems requires the evaluation of fault tolerance mec...
Many software-implemented control flow error detection techniques have been proposed over the years....
Bit flips are known to be a source of strange system behavior, failures, and crashes. They can cause...
Embedded systems used in harsh environments are susceptible to bit-flips, which can cause data flow ...
A popular software attack on a program is by transferring the program control to malicious code inse...
In modern safety-critical embedded systems reliability and performance are two important criteria. I...
Increasing design complexity for current and future generations of microelectronic technologies lead...
Software-based methods for the detection of control-flow errors caused by transient fault usually co...
Today, embedded systems are being used in many (safety-critical) applications. However, due to their...
In this paper we study the impact of compiler optimizations on the error sensitivity of twelve bench...
This paper presents the results of an extensive experimental study of bit-flip errors in instruction...
This paper presents the results of an extensive fault injection study of the impact of processor fau...
Shrinking microprocessor feature size and growing transistor density may increase the soft-error rat...
Software-based fault tolerance techniques are a low-cost way to protect processors against soft erro...
International audienceThis-paper characterizes the effectiveness of an error detection technique tha...
The improvement of dependability in computing systems requires the evaluation of fault tolerance mec...
Many software-implemented control flow error detection techniques have been proposed over the years....
Bit flips are known to be a source of strange system behavior, failures, and crashes. They can cause...
Embedded systems used in harsh environments are susceptible to bit-flips, which can cause data flow ...
A popular software attack on a program is by transferring the program control to malicious code inse...