Loading...
Search for: transient-faults
0.005 seconds
Total 26 records

    Transient Fault Detection in Embedded Processors using Built In Self-Test (BIST) Facilities

    , M.Sc. Thesis Sharif University of Technology Ebrahimi, Mohammad (Author) ; Miremadi, Ghassem (Supervisor)
    Abstract
    Ever increasing applications of embedded systems have motivated designers to pay special atten-tion to the design requirements of such systems. Among embedded applications, safety-critical sys-tems have high reliability requirements as failures in such systems may endanger human life or re-sult in catastrophic consequences. Embedded processors as the computation cores of embedded systems are very crucial from reliability point of view. Reducing feature size, power supply voltage and also increasing operating frequency have increased the occurance rate of transient faults in such processors. Built in Self-Test facilities available in many of embedded systems forms about 70% of total cost in... 

    A highly fault detectable cache architecture for dependable computing

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 3219 , 2004 , Pages 45-59 ; 03029743 (ISSN); 3540231765 (ISBN); 9783540231769 (ISBN) Zarandi, H. R ; Miremadi, S. G ; Sharif University of Technology
    Springer Verlag  2004
    Abstract
    Information integrity in cache memories is a fundamental requirement for dependable computing. As caches comprise much of a CPU chip area and transistor counts, they are reasonable targets for single and multiple transient faults. This paper presents: 1) a fault detection scheme for tag arrays of cache memories and 2) an architectural cache to improve dependability as well as performance. In this architecture, cache space is divided into sets of different sizes and different tag lengths. The error detection scheme and the cache architecture have been evaluated using a trace driven simulation with soft error injection and SPEC 2000 applications. The results show that error detection... 

    Experimental evaluation of three concurrent error detection mechanisms

    , Article 2006 International Conference on Microelectronics, ICM 2006, Dhahran, 16 December 2006 through 19 December 2006 ; 2006 , Pages 67-70 ; 1424407656 (ISBN); 9781424407651 (ISBN) Vahdatpour, A ; Fazeli, M ; Miremadi, S. G ; Sharif University of Technology
    2006
    Abstract
    This paper presents an experimental evaluation of the effectiveness of three hardware-based control flow checking mechanisms, using software-implemented fault injection (SWIFI) method. The fault detection technique uses reconfigurable of the shelf FPGAs to concurrently check the execution flow of the target program. The technique assigns signatures to the target program in the compile time and verifies the signatures using a FPGA as a watchdog processor to detect possible violation caused by the transient faults. A total of 3000 faults were injected in the experimental embedded system, which is based on an 8051 microcontroller, to measure the error detection coverage. The experimental... 

    Transient error detection in embedded systems using reconfigurable components

    , Article Industrial Embedded Systems - IES'2006, Antibes Juan-Les-Pins, 18 October 2006 through 20 October 2006 ; 2006 ; 142440777X (ISBN); 9781424407774 (ISBN) Vahdatpour, A ; Fazeli, M ; Miremadi, S. G ; Sharif University of Technology
    2006
    Abstract
    In this paper, a hardware control flow checking technique is presented and evaluated. This technique uses reconfigurable of the shelf FPGA in order to concurrently check the execution flow of the target micro processor. The technique assigns signatures to the main program in the compile time and verifies the signatures using a FPGA as a watchdog processor to detect possible violation caused by the transient faults. The main characteristic of this technique is its ability to be applied to any kind of processor architecture and platforms. The low imposed hardware and performance overhead by this technique makes it suitable for those applications in which cost is a major concern, such as... 

    An FSM-based monitoring technique to differentiate between follow-up and original errors in safety-critical distributed embedded systems

    , Article Microelectronics Journal ; Volume 42, Issue 6 , June , 2011 , Pages 863-873 ; 00262692 (ISSN) Sedaghat, Y ; Miremadi, S. G ; Sharif University of Technology
    2011
    Abstract
    Nowadays, distributed embedded systems are employed in many safety-critical applications such as X-by-Wire. These systems are composed of several nodes interconnected by a network. Studies show that a transient fault in the communication controller of a network node can lead to errors in the fault site node (called original errors) and/or in the neighbor nodes (called follow-up errors). The communication controller of a network node can be halted due to an error, which may be a follow-up error. In this situation, a follow-up error leads to halt the correct operation of a fault-free controller while the fault site node, i.e. the faulty controller, still continues its operation. In this paper,... 

    Classification of activated faults in the flexray-based networks

    , Article Journal of Electronic Testing: Theory and Applications (JETTA) ; Volume 26, Issue 5 , October , 2010 , Pages 535-547 ; 09238174 (ISSN) Sedaghat, Y ; Miremadi, S. G ; Sharif University of Technology
    Abstract
    FlexRay communication protocol is expected to become the de-facto standard for distributed safety-critical systems. This paper classifies the effects of transient single bit-flip fault injections into the FlexRay communication controller. In this protocol, when an injected fault is activated, this may result in one or more error types, i.e.: Boundary violation, Conflict, Content, Freeze, Synchronization, Syntax, and Invalid frame. To study the activated faults, a FlexRay bus network, composed of four nodes, was modeled by Verilog HDL; and a total of 135,600 transient faults was injected in only one node, called the target node. The results show that only 9,342 of the faults (about 6.9%) were... 

    A low-cost on-line monitoring mechanism for the flexray communication protocol

    , Article Proceedings - 2009 4th Latin-American Symposium on Dependable Computing, LADC 2009, 1 September 2009 through 4 September 2009, Joao Pessoa ; 2009 , Pages 111-118 ; 9780769537603 (ISBN) Sedaghat, Y ; Miremadi, G ; Sharif University of Technology
    2009
    Abstract
    Nowadays, communication protocols are used in safety-critical automotive applications. In these applications, fault tolerance is a main requirement and the existence of single points of failure is a serious threat to system failures. Among the communication protocols, FlexRay is expected to become the communication backbone for future automotive systems. In this paper, we identify single points of failure in the FlexRay protocol by injecting a total of 135,600 single-bit transient faults into all accessible registers of the FlexRay communication controller. The results showed that about 1.2% of all injected faults caused the controller to freeze immediately. Based on these results and... 

    Categorizing and analysis of activated faults in the flexray communication controller registers

    , Article Proceedings of the 14th IEEE European Test Symposium, ETS 2009, 25 May 2009 through 29 May 2009, Sevilla ; 2009 , Pages 121-126 ; 9780769537030 (ISBN) Sedaghat, Y ; Miremadi, G ; Sharif University of Technology
    2009
    Abstract
    FlexRay communication protocol is expected becoming the de-facto standard for distributed safetycritical systems. In this paper, transient single bit-flip faults were injected into the FlexRay communication controller to categorize and analyze the activatedfaults. In this protocol, an activated fault results in one or more error types which are Boundary violation, Conflict, Content, Freeze, Synchronization, and Syntax. To study the activated faults, a FlexRay bus network, composed of four nodes, was modeled by Verilog HDL; and a total of 135,600 transient faults were injected in only one node, where 9,342 (6.9%) of the faults were activated. The results show that the Synchronization error is... 

    A unified approach to detect and distinguish hardware trojans and faults in sram-based fpgas

    , Article Journal of Electronic Testing: Theory and Applications (JETTA) ; Volume 35, Issue 2 , 2019 , Pages 201-214 ; 09238174 (ISSN) Ranjbar, O ; Bayat Sarmadi, S ; Pooyan, F ; Asadi, H ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    In recent years, confrontation with hardware Trojans has become a major concern due to various reasons including outsourcing. Such a growing threat is more pronounced in reconfigurable devices as they are used in widespread applications due to low design cost and short time-to-market. Besides their vulnerability to hardware Trojan attacks, SRAM-based reconfigurable devices are also significantly susceptible to faults originated by particle strikes. There have been various methods to mitigate either hardware Trojan attacks or faults. To our knowledge, however, no method has been presented that can integrate detecting, distinguishing, and mitigating faults and Trojans. In this paper, we... 

    Feature specific control flow checking in COTS-based embedded systems

    , Article Proceedings - 3rd International Conference on Dependability, DEPEND 2010, 18 July 2010 through 25 July 2010 ; July , 2010 , Pages 58-63 ; 9780769540900 (ISBN) Rajabzadeh, A ; Miremadi, S.G ; IARIA ; Sharif University of Technology
    2010
    Abstract
    While the Control Flow Checking (CFC) methods are using the ordinary instruction set and general Arithmetic and Logic Unit (ALU) features to protect the programs against the transient faults, this paper presents a new kind of CFC method, called feature specific CFC. The idea behind this method is using a specific internal hardware in modern processors which provides the ability to monitor internal various parameters of the program. This method is a pure software method and the external hardware overhead is zero. Other overheads have been measured experimentally by executing the workloads on a Pentium system. The execution time overhead is between 42% and 67% and the program size overhead is... 

    A comprehensive analysis on the resilience of adiabatic logic families against transient faults

    , Article Integration ; Volume 72 , May , 2020 , Pages 183-193 Narimani, R ; Safaei, B ; Ejlali, A ; Sharif University of Technology
    Elsevier B.V  2020
    Abstract
    With the emergence of various battery operated technologies in different computing domains and the challenge of heating in such technologies, the issue of energy dissipation has become more critical than ever before. In such systems, energy constraints in one hand, and heat generation, on the other hand, necessitates the employment of energy efficient technologies in the fabrication of digital circuits. One possible solution for mitigating the energy dissipation in digital circuits is the use of adiabatic families in the process of designing computing devices. Adiabatic circuits are designed mainly based on the principles of thermodynamics and provide a paradigm shift in the design of... 

    A low-waste reliable adiabatic platform

    , Article Computers and Electrical Engineering ; Volume 89 , 2021 ; 00457906 (ISSN) Narimani, R ; Safaei, B ; Ejlali, A ; Sharif University of Technology
    Elsevier Ltd  2021
    Abstract
    Given the importance of reducing energy consumption and the challenge of heat generation in classic CMOS circuits, adiabatic circuits are believed as an appropriate alternative. Most of the adiabatic circuit families come with a dual-rail structure, which provides them with an inherent hardware redundancy. Although this redundancy could be used for improving their reliability, no studies have been previously conducted to exploit this feature. In this regard, in this paper, we show that by exploiting the inherent hardware redundancy in adiabatic circuits, their reliability could be improved, while imposing a relatively low amount of energy overhead. Subsequently, with utilizing the outcome... 

    A low-cost fault-tolerant technique for carry look-ahead adder

    , Article 2009 15th IEEE International On-Line Testing Symposium, IOLTS 2009, Sesimbra-Lisbon, 24 June 2009 through 26 June 2009 ; 2009 , Pages 217-222 ; 9781424445950 (ISBN) Namazi, A. R ; Sedaghat, Y ; Miremadi, G ; Ejlali, A. R ; Sharif University of Technology
    2009
    Abstract
    This paper proposes a low-cost fault-tolerant Carry Look-Ahead (CLA) adder which consumes much less power and area overheads in comparison with other fault-tolerant CLA adders. Analytical and experimental results show that this adder corrects all single-bit and multiple-bit transient faults. The Power-Delay Product (PDP) and area overheads of this technique are decreased at least 82% and 71%, respectively, as compared to adders which use traditional TMR, parity prediction, and duplication techniques. © 2009 IEEE  

    A high speed and low cost error correction technique for the carry select adder

    , Article International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Fukuoka Prefecture, 16 March 2009 through 19 March 2009 ; 2009 , Pages 635-640 ; 9780769535647 (ISBN) Namazi, A ; Miremadi, S. G ; Ejlali, A ; Sharif University of Technology
    2009
    Abstract
    In this paper, a high speed and low cost error correction technique is proposed for the Carry Select Adder (CSA) which can correct both transient and permanent errors and is applicable on all partitioning types of the basic CSA circuit. The proposed error correction technique is compatible with all existing error detection techniques which are proposed for the CSA adder. The synthesized results show that applying this novel error correction technique to a CSA with error detection technique results in up to 18.4%, 3.1% and 14.9%, increase in power consumption, delay and area respectively. © 2009 IEEE  

    Analyzing fault effects in the 32-bit OpenRISC 1200 microprocessor

    , Article ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, 4 March 2008 through 7 March 2008, Barcelona ; 2008 , Pages 648-652 ; 0769531024 (ISBN); 9780769531021 (ISBN) Mehdizadeh, N ; Shokrolah Shirazi, M ; Miremadi, S. G ; Sharif University of Technology
    2008
    Abstract
    This paper presents an analysis of the effects and propagation of faults in the open-core 32-bit OpenRISC 1200 microprocessor. The analysis is based on a total of 13,000 transient faults injected into 65 parts of the CPU module in the OpenRISC 1200 core described at the RTL model. A comparison of the effects of faults on the various parts of the CPU including the pipeline's registers, the CPU component such as the register file, the control unit, and the ALU, and the data and address buses is done. It is shown that about 30%, 40% and 27% of injected faults terminated in address, data, and control errors respectively. About 28% of all injected faults resulted in failures. © 2008 IEEE  

    Survivability analysis of wireless sensor network with transient faults

    , Article 2008 International Conference on Computational Intelligence for Modelling Control and Automation, CIMCA 2008, Vienna, 10 December 2008 through 12 December 2008 ; 2008 , Pages 975-980 ; 9780769535142 (ISBN) Masoum, A. R ; Jahangir, A. H ; Taghikhaki, Z ; Sharif University of Technology
    2008
    Abstract
    To the best knowledge of us, survivability for WSN has never been studied considering failure affects on network. We perceive the network survivability as a composite measure consisting of both network failure duration and failure impact on the network. In this paper we will study network survivability in unstably state: in this state, network is affected by the failures that occur temporarily and instantly also may occur several times. In other words, the main characteristics of these failures are their frequency and being temporary. In this paper we will propose a survivability model for network in unstable state that is based on network availability. This availability model, presents... 

    Improvement of fault detection in wireless sensor networks

    , Article 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, Sanya, 8 August 2009 through 9 August 2009 ; Volume 4 , 2009 , Pages 644-646 ; 9781424442461 (ISBN) Khazaei, E ; Barati, A ; Movaghar, A ; Yangzhou University; Guangdong University of Business Studies; Wuhan Institute of Technology; IEEE SMC TC on Education Technology and Training; IEEE Technology Management Council ; Sharif University of Technology
    2009
    Abstract
    This paper presents a centralized fault detection algorithm for wireless sensor networks. Faulty sensor nodes are identified based on comparisons between neighboring nodes and own central node and dissemination of the decision made at each node. RNS system is used to tolerate transient faults in sensing and communication. In this system, arithmetic operations act on residues - reminder of dividing original number in several definite modules - in parallel. Consequently computations on these residues which are smaller than the original number are performed, so speed up arithmetic and decreased power consumption is achieved. ©2009 IEEE  

    Non-preemptive earliest-deadline-first scheduling policy: A performance study

    , Article MASCOTS 2005: 13th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, Atlanta, GA, 27 September 2005 through 29 September 2005 ; Volume 2005 , 2005 , Pages 201-208 ; 15267539 (ISSN) Kargahi, M ; Movaghar, A ; Sharif University of Technology
    2005
    Abstract
    This paper introduces an analytical method for approximating the performance of a soft real-time system modeled by a single-server queue. The service discipline in the queue is earliest-deadline-first (EDF), which is an optimal scheduling policy. Real-time jobs with exponentially distributed deadlines arrive according to a Poisson process. All jobs have deadlines until the end of service and are served non-preemptively. Occurrences of transient faults in the server are also taken into account. The important performance measure to calculate is the loss probability due to deadline misses and/or transient faults. The system is approximated by a Markovian model in the long run. A key parameter,... 

    An Improved aggregated model of residential air conditioners for FIDVR studies

    , Article IEEE Transactions on Power Systems ; Volume 35, Issue 2 , 2020 , Pages 909-919 Hajipour, E ; Saber, H ; Farzin, N ; Karimi, M. R ; Hashemi, S. M ; Agheli, A ; Ayoubzadeh, H ; Ehsan, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Stalling of residential air conditioners (RACs) following a transient fault can delay the voltage recovery ranging from 3 to 20 seconds. This phenomenon is referred to as fault-induced delayed voltage recovery (FIDVR). Several aggregated RAC models have been presented to replicate the actual FIDVR events. However, they usually have two main drawbacks as: i) considering independent stalling voltage and stalling time for all RACs, ii) resulting in only two ultimate modes; either 100% stalled or 100% normal running. This paper amends the abovementioned shortcomings by proposing a simple and effective performance-based RAC model. The proposed model utilizes a simple explicit relation between the... 

    A cost-effective error detection and roll-back recovery technique for embedded microprocessor control logic

    , Article 20th International Conference on Microelectronics, ICM'08, Sharjah, 14 December 2008 through 17 December 2008 ; January , 2008 , Pages 470-473 ; 9781424423705 (ISBN) Ghasemzadeh Mohammadi, H ; Tabkhi, H ; Miremadi, S. G ; Ejlali, A ; Sharif University of Technology
    2008
    Abstract
    The increasing rate of transient faults necessitates the use of on-chip fault-tolerant techniques in embedded microprocessors. Performance overhead is a challenging problem in on-chip fault-tolerant techniques used in the random logic of the embedded microprocessors. This paper presents a signature-based error detection and roll-back recovery technique for the control logic with much lower performance overhead as compared to many previous techniques. The low performance overhead is achieved by eliminating the fault masking overhead cycles in the previous techniques. The performance overhead is analytically studied, and the analytical results recommend at which fault rate the use of the...