Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms
abstract: Rapid technology scaling, the main driver of the power and performance improvements of computing solutions, has also rendered our computing systems extremely susceptible to transient errors called soft errors. Among the arsenal of techniques to protect computation from soft errors, Control...
Other Authors: | |
---|---|
Format: | Dissertation |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/2286/R.I.16462 |
id |
ndltd-asu.edu-item-16462 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-asu.edu-item-164622018-06-22T03:03:41Z Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms abstract: Rapid technology scaling, the main driver of the power and performance improvements of computing solutions, has also rendered our computing systems extremely susceptible to transient errors called soft errors. Among the arsenal of techniques to protect computation from soft errors, Control Flow Checking (CFC) based techniques have gained a reputation of effective, yet low-cost protection mechanism. The basic idea is that, there is a high probability that a soft-fault in program execution will eventually alter the control flow of the program. Therefore just by making sure that the control flow of the program is correct, significant protection can be achieved. More than a dozen techniques for CFC have been developed over the last several decades, ranging from hardware techniques, software techniques, and hardware-software hybrid techniques as well. Our analysis shows that existing CFC techniques are not only ineffective in protecting from soft errors, but cause additional power and performance overheads. For this analysis, we develop and validate a simulation based experimental setup to accurately and quantitatively estimate the architectural vulnerability of a program execution on a processor micro-architecture. We model the protection achieved by various state-of-the-art CFC techniques in this quantitative vulnerability estimation setup, and find out that software only CFC protection schemes (CFCSS, CFCSS+NA, CEDA) increase system vulnerability by 18% to 21% with 17% to 38% performance overhead. Hybrid CFC protection (CFEDC) increases vulnerability by 5%, while the vulnerability remains almost the same for hardware only CFC protection (CFCET); notwithstanding the hardware overheads of design cost, area, and power incurred in the hardware modifications required for their implementations. Dissertation/Thesis Rhisheekesan, Abhishek (Author) Shrivastava, Aviral (Advisor) Colbourn, Charles Joseph (Committee member) Wu, Carole-Jean (Committee member) Arizona State University (Publisher) Computer science eng 83 pages M.S. Computer Science 2013 Masters Thesis http://hdl.handle.net/2286/R.I.16462 http://rightsstatements.org/vocab/InC/1.0/ All Rights Reserved 2013 |
collection |
NDLTD |
language |
English |
format |
Dissertation |
sources |
NDLTD |
topic |
Computer science |
spellingShingle |
Computer science Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms |
description |
abstract: Rapid technology scaling, the main driver of the power and performance improvements of computing solutions, has also rendered our computing systems extremely susceptible to transient errors called soft errors. Among the arsenal of techniques to protect computation from soft errors, Control Flow Checking (CFC) based techniques have gained a reputation of effective, yet low-cost protection mechanism. The basic idea is that, there is a high probability that a soft-fault in program execution will eventually alter the control flow of the program. Therefore just by making sure that the control flow of the program is correct, significant protection can be achieved. More than a dozen techniques for CFC have been developed over the last several decades, ranging from hardware techniques, software techniques, and hardware-software hybrid techniques as well. Our analysis shows that existing CFC techniques are not only ineffective in protecting from soft errors, but cause additional power and performance overheads. For this analysis, we develop and validate a simulation based experimental setup to accurately and quantitatively estimate the architectural vulnerability of a program execution on a processor micro-architecture. We model the protection achieved by various state-of-the-art CFC techniques in this quantitative vulnerability estimation setup, and find out that software only CFC protection schemes (CFCSS, CFCSS+NA, CEDA) increase system vulnerability by 18% to 21% with 17% to 38% performance overhead. Hybrid CFC protection (CFEDC) increases vulnerability by 5%, while the vulnerability remains almost the same for hardware only CFC protection (CFCET); notwithstanding the hardware overheads of design cost, area, and power incurred in the hardware modifications required for their implementations. === Dissertation/Thesis === M.S. Computer Science 2013 |
author2 |
Rhisheekesan, Abhishek (Author) |
author_facet |
Rhisheekesan, Abhishek (Author) |
title |
Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms |
title_short |
Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms |
title_full |
Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms |
title_fullStr |
Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms |
title_full_unstemmed |
Quantitative Evaluation of Control Flow based Soft Error Protection Mechanisms |
title_sort |
quantitative evaluation of control flow based soft error protection mechanisms |
publishDate |
2013 |
url |
http://hdl.handle.net/2286/R.I.16462 |
_version_ |
1718699976963391488 |