2011
DOI: 10.1109/tns.2011.2112379
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Co-Design Approach for Soft Errors Mitigation in Embedded Systems

Abstract: Abstract-A novel proposal to design radiation-tolerant embedded systems combining hardware and software mitigation techniques is presented. Two suites of tools are developed to automatically apply the techniques and to facilitate the tradeoffs analyses.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
3

Relationship

4
3

Authors

Journals

citations
Cited by 33 publications
(17 citation statements)
references
References 30 publications
(17 reference statements)
0
17
0
Order By: Relevance
“…The results presented in this paper focus only on the evaluation of the proposed approach to harden the configuration data of microcontroller peripherals and interrupts. The SEU and SET sensitivities of the microprocessor core using partial hardware and software hardening have been analyzed previously in [16] and [17], respectively.…”
Section: Resultsmentioning
confidence: 99%
“…The results presented in this paper focus only on the evaluation of the proposed approach to harden the configuration data of microcontroller peripherals and interrupts. The SEU and SET sensitivities of the microprocessor core using partial hardware and software hardening have been analyzed previously in [16] and [17], respectively.…”
Section: Resultsmentioning
confidence: 99%
“…This approach presents the limitation that it cannot be applied with on-chip cache memories. Finally, different hybrid approaches, based on selective hardening, are evaluated in terms of execution time and memory overheads and fault detection capability in [18] and [19]. But the presented hybrid solutions are intrusive, meaning that the microprocessor used must be redesigned.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The software-based approaches are very flexible and can be used with Commercial Off-TheShelf (COTS) microprocessors, because no internal modifications to the microprocessor are required. However, they may produce large overheads in processing time and storage needs [18], [19]. These can be particularly very large for control-flow checking, because a large amount of signatures need to be stored and checked very often.…”
Section: Introductionmentioning
confidence: 99%
“…It consists of protecting only the most critical parts of the designs. This partial protection can be achieved by means of selective redundancy applied to: hardware [6][7], software [8][9], or by means of hybrid hardware/software approaches [10][11].…”
Section: Introductionmentioning
confidence: 99%
“…In particular for processor-based systems, a well-known strategy consists of protecting only the most critical registers in the microprocessor register file [8][9][10][11].Thus, it is evident the necessity to identify the most critical registers properly during an early design stage in order to facilitate the selection of the hardened set of registers. A proper selection of registers determines to achieve good efficiency/cost tradeoffs for the designed solution and, at the same time, permits to explore the design space effectively, avoiding costly explorations guided by brute force strategies [24].…”
Section: Introductionmentioning
confidence: 99%