English   español  
Please use this identifier to cite or link to this item: http://hdl.handle.net/10261/132354
Share/Impact:
Statistics
logo share SHARE logo core CORE   Add this article to your Mendeley library MendeleyBASE

Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL
Exportar a otros formatos:
Title

Bit Impact Factor: Towards making fair vulnerability comparison

AuthorsCan, Serdarzafer; Yalcin, Gulay; Ergin, Oguz; Unsal, Osman; Cristal, Adrian
KeywordsVulnerability
Soft errors
Fault injection
Architectural vulnerability factor
Issue Date2014
PublisherElsevier
CitationMicroprocessors and Microsystems 38 (6): 598- 604 (2014)
AbstractReliability is becoming a major design concern in contemporary microprocessors since soft error rate is increasing due to technology scaling. Therefore, design time system vulnerability estimation is of paramount importance. Architectural Vulnerability Factor (AVF) is an early vulnerability estimation methodology. However, AVF considers that the value of a bit in a clock cycle is either required for Architecturally Correct Execution (i.e. ACE-bit) or not (i.e. unACE-bit); therefore, AVF cannot distinguish the vulnerability impact level of an ACE-bit. In this study, we present a new dimension which takes into account the vulnerability impact level of a bit. We introduce Bit Impact Factor metric which, we believe, will be helpful for extending AVF evaluation to provide a more accurate vulnerability analysis. © 2014 Elsevier B.V. All rights reserved.
URIhttp://hdl.handle.net/10261/132354
DOI10.1016/j.micpro.2014.04.009
Identifiersdoi: 10.1016/j.micpro.2014.04.009
issn: 0141-9331
Appears in Collections:(IIIA) Artículos
Files in This Item:
File Description SizeFormat 
accesoRestringido.pdf15,38 kBAdobe PDFThumbnail
View/Open
Show full item record
Review this work
 

Related articles:


WARNING: Items in Digital.CSIC are protected by copyright, with all rights reserved, unless otherwise indicated.