2015
DOI: 10.1109/tns.2015.2484842
|View full text |Cite
|
Sign up to set email alerts
|

S-SETA: Selective Software-Only Error-Detection Technique Using Assertions

Abstract: Abstract-Software-based techniques offer several advantages to increase the reliability of processor-based systems at very low cost, but they cause performance degradation and an increase of the code size. To meet constraints in performance and memory, we propose SETA, a new control-flow software-only technique that uses assertions to detect errors affecting the program flow. SETA is an independent technique, but it was conceived to work together with previously proposed data-flow techniques that aim at reduci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 22 publications
0
17
0
Order By: Relevance
“…(1) Software CFC techniques [2,3,8,9,15,28,[39][40][41] generally detect deviation in control flow by modification of the program by compilers or binary translators to insert signatures for each basic block in the program to represent the program's control flow, and by comparing these signatures with the signatures generated at runtime. For example, CFCSS [28] inserts a few instructions at the beginning of each basic block to set the outgoing signature (identifying the basic block in the program), and check the incoming signature register in the successor basic blocks to ensure the correctness of execution flow.…”
Section: Control Flow Errors and Control Flow Checkingmentioning
confidence: 99%
See 1 more Smart Citation
“…(1) Software CFC techniques [2,3,8,9,15,28,[39][40][41] generally detect deviation in control flow by modification of the program by compilers or binary translators to insert signatures for each basic block in the program to represent the program's control flow, and by comparing these signatures with the signatures generated at runtime. For example, CFCSS [28] inserts a few instructions at the beginning of each basic block to set the outgoing signature (identifying the basic block in the program), and check the incoming signature register in the successor basic blocks to ensure the correctness of execution flow.…”
Section: Control Flow Errors and Control Flow Checkingmentioning
confidence: 99%
“…For example, as shown in Figure 1, CFCSS adds some instructions to assign a variable to a unique value (signature) in each basic block, and also adds instructions in each basic block to check if the control flow is coming from a correct predecessor basic block. Several control flow based soft error protection techniques were developed over the last few decades and span across design layers from hardware [11, 23-25, 31, 32], software [2,3,9,15,28,39,40], and hardware-software hybrid techniques [4,10,12,[34][35][36]42].…”
Section: Introductionmentioning
confidence: 99%
“…One way to selectively apply CFE detection, is to simply ignore some basic blocks. This approach is taken by the S-SETA technique [5]. Within S-SETA, smaller basic blocks have no extra instructions inserted in order to reduce the imposed execution time overhead.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The imposed execution time overhead, however, is still relatively high. Therefore, research has focused on selective CFE detection techniques [5,9]. Selective CFE detection techniques only protect a selected part of the target program to reduce the imposed execution time overhead.…”
Section: Introductionmentioning
confidence: 99%
“…Recent approaches propose the partial or selective application of hardening techniques to overcome those drawbacks [5]. These are also known as selective-SIHFT in the case of the software-based ones [6,7]. The general approach consists of protecting only a selected subset of elements (e.g., processor registers, basic blocks of instructions, among others) to achieve significant reductions in overheads with minimal impact on the system's reliability.…”
Section: Introductionmentioning
confidence: 99%