Loading...

Using input-to-output masking for system-level vulnerability estimation in high-performance processors

Haghdoost, A ; Sharif University of Technology | 2010

533 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/CADS.2010.5623540
  3. Publisher: 2010
  4. Abstract:
  5. In this paper, we enhance previously suggested vulnerability estimation techniques by presenting a detailed modeling technique based on Input-to-Output Masking (IOM). Moreover we use our model to compute the System-level Vulnerability Factor (SVF) for data-path components in a highperformance processor. As we show, recent suggested estimation techniques overlook the issue of error masking, mainly focusing on time periods in which an error could potentially propagate in the system. In this work we show that this is incomplete as it ignores the masking impact. Our results show that including the IOM factor can significantly affect the system-level vulnerability for data-path components. As a case study, we analyze the IOM factor for CPUs with different configurations. Our results show that the average variation of the IOM factor is less than 5%. Meantime, the IOM factor varies between 24% to 76% for the applications studied here. Accordingly we find the IOM factor to be less configuration dependent and mainly workload dependent
  6. Keywords:
  7. Fault masking factor ; System level-vulnerability ; Architectural vulnerabulity factor ; Data paths ; Detailed modeling ; Error masking ; Estimation techniques ; Fault masking ; High performance processors ; System levels ; Time-periods ; Estimation ; Program processors ; Computer architecture
  8. Source: Proceedings - 15th CSI International Symposium on Computer Architecture and Digital Systems, CADS 2010, 23 September 2010 through 24 September 2010 ; September , 2010 , Pages 91-98 ; 9781424462698 (ISBN)
  9. URL: http://ieeexplore.ieee.org/document/5623540