2019
DOI: 10.1145/3301311
|View full text |Cite
|
Sign up to set email alerts
|

Control Flow Checking or Not? (for Soft Errors)

Abstract: Huge leaps in performance and power improvements of computing systems are driven by rapid technology scaling, but technology scaling has also rendered computing systems susceptible to soft errors. Among the soft error protection techniques, Control Flow Checking (CFC) based techniques have gained a reputation of being lightweight yet effective. The main idea behind CFCs is to check if the program is executing the instructions in the right order. In order to validate the protection claims of existing CFCs, we d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 37 publications
0
5
0
Order By: Relevance
“…Instruction repeating, error correction codes, and signature comparisons are not able to correct different types of faults. This is shown to increase the vulnerability for some cases [31]. In contrast, our scheme is shown to detect and correct various instruction faults with various amounts of bitflips (up to 11 for fault models 4-I/II).…”
Section: Validation Of Error Detection and Correction Schemementioning
confidence: 90%
“…Instruction repeating, error correction codes, and signature comparisons are not able to correct different types of faults. This is shown to increase the vulnerability for some cases [31]. In contrast, our scheme is shown to detect and correct various instruction faults with various amounts of bitflips (up to 11 for fault models 4-I/II).…”
Section: Validation Of Error Detection and Correction Schemementioning
confidence: 90%
“…While a control-flow error occurs when an error causes a deviation from the correct program flow (e.g., incorrect branch), a data-flow soft error refers to the occurrence of a bit-flip in a storage element, such as a register or memory block. The application hardening module integrates data-flow mitigation techniques because most soft errors affect data-flow rather than the system's control-flow [38]. The underlying software-based mitigation techniques are architecture-independent, and their development is underpinned by a set of rules proposed in [39], which target data-flow strategies that aim to detect faults affecting values stored in register banks and memory elements.…”
Section: Application Hardening Modulementioning
confidence: 99%
“…While CFI techniques are built considering an adversarial perspective, there exists a line of research that applies similar methodologies to detect erroneous control-flow redirection due to non-malicious soft-errors [41,68,74,87]. These works utilize very similar techniques, such as by creating signatures for each basic block (code blocks that are delineated by control-flow transfers but do not contain any transfers themselves) and comparing currently executing basic block against a pre-determined graph of valid signature chains [63].…”
Section: A Note On Control-flow Checking For Soft Errorsmentioning
confidence: 99%