Proceedings of the 50th Annual Design Automation Conference 2013
DOI: 10.1145/2463209.2488755
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting program-level masking and error propagation for constrained reliability optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 62 publications
(31 citation statements)
references
References 22 publications
0
31
0
Order By: Relevance
“…To evaluate the variable vulnerabilities to soft error, several important factors should be taken into account, including lifetime, functional dependencies, weight in conditional branches and error masking effects [12,14,15,16]. The work in [12,14,15] did not consider the important error masking phenomena, especially for the relational and logic operations which are common in CFI designs.…”
Section: Vulnerability Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…To evaluate the variable vulnerabilities to soft error, several important factors should be taken into account, including lifetime, functional dependencies, weight in conditional branches and error masking effects [12,14,15,16]. The work in [12,14,15] did not consider the important error masking phenomena, especially for the relational and logic operations which are common in CFI designs.…”
Section: Vulnerability Analysismentioning
confidence: 99%
“…The work in [12,14,15] did not consider the important error masking phenomena, especially for the relational and logic operations which are common in CFI designs. The authors in [16] considered only the data flow errors and used path enumeration to exploit program-level error propagation and masking mechanisms. However, path enumeration is not applicable for CFI designs, as not only the number of paths grow exponentially with the number of branch nodes, but also the presence of loops makes this enumeration intractable.…”
Section: Vulnerability Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…However, all the existing works focus on approximating different components such as procedure approximation, input data approximation, control-flow based approximation etc. [4,27]. Other works have studied the errorresilience of data in architectural components such as the arithmetic units, register files, etc.…”
Section: Overviewmentioning
confidence: 99%
“…This may be easily accomplished for small programs, but is difficult or infeasible for complex programs and legacy softwares. Other works have shown that program approximations can be achieved through algorithmic choices, runtime decision making frameworks, and on the architectural or device level [1,2,6,27]. The provision of algorithmic choices too is the programmer's responsibility and the application is compiled using all the versions of a procedure.…”
Section: Introductionmentioning
confidence: 99%