Proceedings 33rd Annual IEEE/ACM International Symposium on Microarchitecture. MICRO-33 2000
DOI: 10.1109/micro.2000.898061
|View full text |Cite
|
Sign up to set email alerts
|

Efficient checker processor design

Abstract: The design and implementation of a modern microprocessor creates many reliability challenges. Designers must verify the correctness of large complex systems and construct implementations that work reliably in varied (and occasionally adverse) operating conditions. In our previous work, we proposed a solution to these problems by adding a simple, easily verifiable checker processor at pipeline retirement. Performance analyses of our initial design were promising, overall slowdowns due to checker processor hazar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(24 citation statements)
references
References 12 publications
0
24
0
Order By: Relevance
“…Prior work entrusts a robust checker to resolve input incoherence. For example, DIVA checkers with dedicated caches [8] and slipstreamed re-execution [25] both allow the leading thread's load values to differ from the trailing threads'. However, these proposals do not address the possibility of data races in shared-memory multiprocessors and require complex additions to support robust redundant execution.…”
Section: Input Incoherencementioning
confidence: 99%
“…Prior work entrusts a robust checker to resolve input incoherence. For example, DIVA checkers with dedicated caches [8] and slipstreamed re-execution [25] both allow the leading thread's load values to differ from the trailing threads'. However, these proposals do not address the possibility of data races in shared-memory multiprocessors and require complex additions to support robust redundant execution.…”
Section: Input Incoherencementioning
confidence: 99%
“…We show that TRUSTNET and DATAWATCH protect the pipeline and cache memory systems for a microprocessor closely matching the Sun Microsystems' OpenSPARC T2 processor against a large class of attacks at the cost of negligible storage (less than 2 KB per core) and no performance loss. Additionally, TRUSTNET and DATAWATCH, in concert with pre-existing solutions (partial duplication [25]), can provide coverage against many known hardware design level backdoors.…”
Section: Tapeout and Fabrication Deploymentmentioning
confidence: 99%
“…The DIVA approach [19][20][21] uses a simple and robust processor, called DIVA checker, to verify the operation of the high-performance speculative core. This approach can also be adapted to support ILCOFT by selecting the instructions whose results have to be verified by the DIVA checker.…”
Section: Ft Schemes Adaptable To Ilcoftmentioning
confidence: 99%