2012
DOI: 10.4236/jsea.2012.59078
|View full text |Cite
|
Sign up to set email alerts
|

SEDSR: Soft Error Detection Using Software Redundancy

Abstract: This paper presents a new method for soft error detection using software redundancy (SEDSR) that is able to detect transient faults. Soft errors damage the control flow and data of programs and designers usually use hardware-based solutions to handle them. Software-based techniques for soft error detection force less cost and delay to systems and do not change their configuration. Therefore, these kinds of methods are appropriate alternatives for hardware-based techniques. SEDSR has two separate parts for data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(40 citation statements)
references
References 12 publications
0
40
0
Order By: Relevance
“…Software countermeasures can be designed at different levels, such as at an algorithmic level [6], in a high-level programming language [7][8][9] or at assembly level [10][11][12]. While higher level countermeasures may be optimized away or altered by a compiler, low-level countermeasures are compatible with existing compilers and toolchains.…”
Section: Many Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Software countermeasures can be designed at different levels, such as at an algorithmic level [6], in a high-level programming language [7][8][9] or at assembly level [10][11][12]. While higher level countermeasures may be optimized away or altered by a compiler, low-level countermeasures are compatible with existing compilers and toolchains.…”
Section: Many Countermeasuresmentioning
confidence: 99%
“…Software countermeasures are often based on temporal redundancy (i.e. performing the same computation multiple times) to detect or tolerate errors during computations [10,12,8,11]. Control flow protection requires different mechanisms to detect a modification of the execution flow [7,14].…”
Section: Related Workmentioning
confidence: 99%
“…The introduced soft errors can corrupt the data of the program in execution. To counter this data corruption, a number of data flow error detection and recovery techniques have been proposed in literature [1,7,8,[12][13][14][15][16][17][19][20][21]. In previous work [4], we listed several data flow error detection techniques and discussed their reported results.…”
Section: Related Workmentioning
confidence: 99%
“…A number of data flow error detection techniques have been developed based on a unique duplication mechanism for better fault coverage or lower overhead in terms of memory consumption. The duplication can be applied at various levels such as a full duplication and selective duplication [1,4,7,8,[12][13][14][15]17,18]. Full duplication techniques and selective code duplication techniques are discussed in Sections 2.1 and 2.2 respectively.…”
Section: Data Flow Error Detectionmentioning
confidence: 99%
See 1 more Smart Citation