2012
DOI: 10.1109/tdsc.2011.54
|View full text |Cite
|
Sign up to set email alerts
|

Compiler-Directed Soft Error Mitigation for Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(25 citation statements)
references
References 32 publications
0
25
0
Order By: Relevance
“…In order to evaluate the proposed technique, firstly, it was implemented using the API (Application Programming Interface) exposed by the Software Hardening Environment (SHE ) (proposed in [47]). Secondly, the fault coverage of the approach was assessed using an FPGA emulation-based fault injection tool called FTUnshades [50].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to evaluate the proposed technique, firstly, it was implemented using the API (Application Programming Interface) exposed by the Software Hardening Environment (SHE ) (proposed in [47]). Secondly, the fault coverage of the approach was assessed using an FPGA emulation-based fault injection tool called FTUnshades [50].…”
Section: Discussionmentioning
confidence: 99%
“…In this context, the S-SWIFT-R technique here proposed can be used as a part of a more complex hybrid technique, or as a component of a cross-layer protection strategy. In fact, our previous works [47,48] present some preliminary results of this, when tailored hybrid approaches are used by combining partial protection on both hardware and software (co-hardening). Unlike our previous approaches that were aimed at the hardware/software co-design, the presented proposal in this work focuses on the presentation of a new selective software-only fault recovery technique suitable for low-cost COTS -based applications.…”
Section: Related Workmentioning
confidence: 99%
“…A first software implementation of this technique was presented in [36] and tested on an Intel 8051 microcontroller. In [37], the authors present a new methodology that permits easy combination of hardware and software soft errors mitigation techniques and allows the automatic generation of protected source code, called hardened code.…”
Section: Harsh Condition Effects Mitigation On Programmable Cots Devicesmentioning
confidence: 99%
“…The rest of them consist of typical small computations: bubble sort (BUB), Fibonacci (FIB), greatest common divisor (GCD), matrix addition (MADD), matrix multiplication (MM), scalar multiplication (MULT), exponentiation (POW), and quick sort (QSORT). In this case, fault injection tests were performed using the software-based simulation tool presented and validated in [22]. Table 1 presents the obtained results for the PicoBlaze case study.…”
Section: Case Study 1: Picoblazementioning
confidence: 99%