2009
DOI: 10.1007/978-3-642-04468-7_23
|View full text |Cite
|
Sign up to set email alerts
|

AN-Encoding Compiler: Building Safety-Critical Systems with Commodity Hardware

Abstract: Abstract. In the future, we expect commodity hardware to be used in safety-critical applications. However, in the future commodity hardware is expected to become less reliable and more susceptible to soft errors because of decreasing feature size and reduced power supply. Thus, software-implemented approaches to deal with unreliable hardware will be needed. To simplify the handling of value failures, we provide failure virtualization in the sense that we transform arbitrary value failures caused by erroneous e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(23 citation statements)
references
References 35 publications
(50 reference statements)
0
23
0
Order By: Relevance
“…Reis et al integrated control-flow checking and error detection into one compiler, SWIFT [34]. SWIFT still had a couple of vulnerabilities that were addressed by Fetzer et al [11] using arithmetic coding techniques.…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…Reis et al integrated control-flow checking and error detection into one compiler, SWIFT [34]. SWIFT still had a couple of vulnerabilities that were addressed by Fetzer et al [11] using arithmetic coding techniques.…”
Section: Related Workmentioning
confidence: 97%
“…In contrast to the application layer, we have full control over the software stack running in the critical core. This allows us to make use of potentially expensive techniques available at the software level such as applying basic block signatures [26], operand encoding [11], and compiler-inserted assertions [45].…”
Section: System Architecturementioning
confidence: 99%
“…Surprisingly, in spite of their impact on total system resiliency and -compared to the rest of the system -their very small memory footprint, state-of-the-art OS kernels are not equipped with softwarebased protection against memory errors: An efficient softwarebased fault-tolerance technique would offer an enormous potential to reduce system failures. Unfortunately, most earlier attempts to apply software-based memory protection suffer from excessive runtime overhead, ranging between 30 % and 260 % [13], [14], [15], [16]. These studies only address userlevel applications; such extreme performance degradations are considered unacceptable for the OS layer, especially in the case of general-purpose OS.…”
Section: Problem Analysismentioning
confidence: 99%
“…Fetzer et al [16] use arithmetic AN-encoding of memory (among other methods) to detect errors by essentially doubling the storage space for encoded values. Even at this high level of redundancy, recovery is unaddressed.…”
Section: Software-based Memory Protectionmentioning
confidence: 99%
“…To reduce costs and make soft error tolerance available to a wider range of application scenarios, software-based fault handling methods for control flow [15,16,14,17,29,22,6] or memory protection [23] were developed over the recent years. Lately, Chang et al [21] proposed SWIFT-R, an approach that triplicates machine instructions and uses a majority voter in combination with encoding techniques.…”
Section: Related Workmentioning
confidence: 99%