Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms

abstract: Rapid technology scaling, the main driver of the power and performance improvements of computing solutions, has also rendered our computing systems extremely susceptible to transient errors called soft errors. Among the arsenal of techniques to protect computation from soft errors, Control...

Full description

Bibliographic Details
Other Authors: Rhisheekesan, Abhishek (Author)
Format: Dissertation
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/2286/R.I.16462
id ndltd-asu.edu-item-16462
record_format oai_dc
spelling ndltd-asu.edu-item-164622018-06-22T03:03:41Z Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms abstract: Rapid technology scaling, the main driver of the power and performance improvements of computing solutions, has also rendered our computing systems extremely susceptible to transient errors called soft errors. Among the arsenal of techniques to protect computation from soft errors, Control Flow Checking (CFC) based techniques have gained a reputation of effective, yet low-cost protection mechanism. The basic idea is that, there is a high probability that a soft-fault in program execution will eventually alter the control flow of the program. Therefore just by making sure that the control flow of the program is correct, significant protection can be achieved. More than a dozen techniques for CFC have been developed over the last several decades, ranging from hardware techniques, software techniques, and hardware-software hybrid techniques as well. Our analysis shows that existing CFC techniques are not only ineffective in protecting from soft errors, but cause additional power and performance overheads. For this analysis, we develop and validate a simulation based experimental setup to accurately and quantitatively estimate the architectural vulnerability of a program execution on a processor micro-architecture. We model the protection achieved by various state-of-the-art CFC techniques in this quantitative vulnerability estimation setup, and find out that software only CFC protection schemes (CFCSS, CFCSS+NA, CEDA) increase system vulnerability by 18% to 21% with 17% to 38% performance overhead. Hybrid CFC protection (CFEDC) increases vulnerability by 5%, while the vulnerability remains almost the same for hardware only CFC protection (CFCET); notwithstanding the hardware overheads of design cost, area, and power incurred in the hardware modifications required for their implementations. Dissertation/Thesis Rhisheekesan, Abhishek (Author) Shrivastava, Aviral (Advisor) Colbourn, Charles Joseph (Committee member) Wu, Carole-Jean (Committee member) Arizona State University (Publisher) Computer science eng 83 pages M.S. Computer Science 2013 Masters Thesis http://hdl.handle.net/2286/R.I.16462 http://rightsstatements.org/vocab/InC/1.0/ All Rights Reserved 2013
collection NDLTD
language English
format Dissertation
sources NDLTD
topic Computer science
spellingShingle Computer science
Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms
description abstract: Rapid technology scaling, the main driver of the power and performance improvements of computing solutions, has also rendered our computing systems extremely susceptible to transient errors called soft errors. Among the arsenal of techniques to protect computation from soft errors, Control Flow Checking (CFC) based techniques have gained a reputation of effective, yet low-cost protection mechanism. The basic idea is that, there is a high probability that a soft-fault in program execution will eventually alter the control flow of the program. Therefore just by making sure that the control flow of the program is correct, significant protection can be achieved. More than a dozen techniques for CFC have been developed over the last several decades, ranging from hardware techniques, software techniques, and hardware-software hybrid techniques as well. Our analysis shows that existing CFC techniques are not only ineffective in protecting from soft errors, but cause additional power and performance overheads. For this analysis, we develop and validate a simulation based experimental setup to accurately and quantitatively estimate the architectural vulnerability of a program execution on a processor micro-architecture. We model the protection achieved by various state-of-the-art CFC techniques in this quantitative vulnerability estimation setup, and find out that software only CFC protection schemes (CFCSS, CFCSS+NA, CEDA) increase system vulnerability by 18% to 21% with 17% to 38% performance overhead. Hybrid CFC protection (CFEDC) increases vulnerability by 5%, while the vulnerability remains almost the same for hardware only CFC protection (CFCET); notwithstanding the hardware overheads of design cost, area, and power incurred in the hardware modifications required for their implementations. === Dissertation/Thesis === M.S. Computer Science 2013
author2 Rhisheekesan, Abhishek (Author)
author_facet Rhisheekesan, Abhishek (Author)
title Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms
title_short Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms
title_full Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms
title_fullStr Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms
title_full_unstemmed Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms
title_sort quantitative evaluation of control flow based soft error protection mechanisms
publishDate 2013
url http://hdl.handle.net/2286/R.I.16462
_version_ 1718699976963391488