This paper presents a detailed analysis of the efficiency of software-based techniques to mitigate SEU and SET in microprocessors. A set of well-known rules is presented and implemented automatically to transform an unprotected program into a hardened one. SEU and SET are injected in all sensitive areas of a MIPS-based microprocessor architecture. The efficiency of each rule and a combination of them are tested. Experimental results show the limitations of the control-flow techniques in detecting the majority of SEU and SET faults, even when different basic block sizes are evaluated. A further analysis on the undetected faults with control flow effect is done and five causes are explained. The conclusions may lead designers into developing...
The negative impact of the aggressive scaling of technology nodes on the sensitivity of CMOS devices...
International audienceIn this paper, proposed software tools for predicting the rate and nature of o...
The improvement of dependability in computing systems requires the evaluation of fault tolerance mec...
The use of microprocessor-based systems is gaining importance in application domains where safety is...
International audienceIn this paper two lost-cost solutions for providing error detection capabiliti...
The use of microprocessor-based systems is gaining importance in application domains where safety i...
Software-based fault tolerance techniques are a low-cost way to protect processors against soft erro...
The importance of fault tolerance at the processor archi-tecture level has been made increasingly im...
In this paper, two low-cost solutions devoted to provide processor-based systems with error-detectio...
International audienceIn this paper is described a purely software technique allowing to detect SEUs...
In the recent years both software and hardware techniques have been adopted to carry out reliable de...
Even if software code is fault-free, hardware failures can alter a value in memory, possibly where t...
Control flow errors have been widely addressed in literature as a possible threat to the dependabili...
Computers embedded in satellites are sensitive to cosmic radiations. These cause transient faults th...
Modern processors embed features such as pipelined execution units and cache memories that can hardl...
The negative impact of the aggressive scaling of technology nodes on the sensitivity of CMOS devices...
International audienceIn this paper, proposed software tools for predicting the rate and nature of o...
The improvement of dependability in computing systems requires the evaluation of fault tolerance mec...
The use of microprocessor-based systems is gaining importance in application domains where safety is...
International audienceIn this paper two lost-cost solutions for providing error detection capabiliti...
The use of microprocessor-based systems is gaining importance in application domains where safety i...
Software-based fault tolerance techniques are a low-cost way to protect processors against soft erro...
The importance of fault tolerance at the processor archi-tecture level has been made increasingly im...
In this paper, two low-cost solutions devoted to provide processor-based systems with error-detectio...
International audienceIn this paper is described a purely software technique allowing to detect SEUs...
In the recent years both software and hardware techniques have been adopted to carry out reliable de...
Even if software code is fault-free, hardware failures can alter a value in memory, possibly where t...
Control flow errors have been widely addressed in literature as a possible threat to the dependabili...
Computers embedded in satellites are sensitive to cosmic radiations. These cause transient faults th...
Modern processors embed features such as pipelined execution units and cache memories that can hardl...
The negative impact of the aggressive scaling of technology nodes on the sensitivity of CMOS devices...
International audienceIn this paper, proposed software tools for predicting the rate and nature of o...
The improvement of dependability in computing systems requires the evaluation of fault tolerance mec...