Improving the Efficiency of Software-Based Fault Protection Mechanisms With HUSTLE

被引:0
|
作者
Ferrante, Nicola [1 ,2 ]
Fanucci, Luca [1 ]
Rossi, Francesco [2 ]
Terrosi, Francesco [3 ]
Bondavalli, Andrea [2 ,3 ]
机构
[1] Univ Pisa, Dept Informat Engn, I-56122 Pisa, Italy
[2] ResilTech Srl, I-56025 Pontedera, Italy
[3] Univ Florence, Dept Math & Informat, I-50134 Florence, Italy
来源
IEEE ACCESS | 2024年 / 12卷
基金
欧盟地平线“2020”;
关键词
Task analysis; Codes; Safety; Payloads; Libraries; Standards; Power line communications; Error detection; functional testing; on-line testing; safety; SW-test libraries;
D O I
10.1109/ACCESS.2024.3434718
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To achieve confidence in safety-critical systems, requires among others to meet high requirements on online testing of computer systems, as dictated by safety standards such as ISO26262, IEC61508, and CENELEC EN 5012X. Online testing can be performed through the periodic execution of online SW Test Libraries, which are widely used in safety-related applications as a valuable safety mechanism to protect against random HW faults. SW Test Libraries introduce a non-negligible overhead on system performance, exacerbated by the increasing complexity of HW devices. This contrasts with the efforts of researchers and system designers for developing efficient systems. Reducing this overhead is an important achievement. We propose here HUSTLE, a Hardware Unit for SW-Test Libraries Efficient execution, which can be integrated into the chip design with minimum modification to the CPU's design. HUSTLE contains an Internal Memory, where the library code is stored, and sends instructions to the CPU, bypassing the Memory Subsystem. To further improve efficiency, we also propose a scheduling mechanism that allows to exploit the idle time of the CPU's execution unit. To show the efficiency gain in supporting the test libraries execution, we ran some experiments, where a considerable reduction of the overall CPU load was observed. Finally, remarks regarding the limited impact on the area and power consumption are presented.
引用
收藏
页码:104728 / 104741
页数:14
相关论文
共 50 条
  • [1] Protection of software-based survivability mechanisms
    Wang, CX
    Davidson, J
    Hill, J
    Knight, J
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 193 - 202
  • [2] Software-based fault tolerant amay
    Centre for Development of Advanced Computing, Kolkata
    IEEE Potentials, 2006, 1 (41-45):
  • [3] Software-based replication for fault tolerance
    Guerraoui, R
    Schiper, A
    COMPUTER, 1997, 30 (04) : 68 - +
  • [4] Software-Based Protection Is Moving to the Mainstream
    Gu, Yuan Xiang
    Wyseur, Brecht
    Preneel, Bart
    IEEE SOFTWARE, 2011, 28 (02) : 56 - +
  • [5] A software-based fault injection tool (SOFIT)
    Avresky, DR
    Geoghegan, SJ
    Tapadiya, PK
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 1998, 13 (06): : 327 - 337
  • [6] Software-based fault injection tool (SOFIT)
    Boston Univ, Boston, United States
    Comput Syst Sci Eng, 6 (327-337):
  • [7] Software-based delay fault testing of processor cores
    Singh, V
    Inoue, M
    Saluja, KK
    Fujiwara, H
    ATS 2003: 12TH ASIAN TEST SYMPOSIUM, PROCEEDINGS, 2003, : 68 - 71
  • [8] FaultLine: Software-based Fault Injection on Memory Transfers
    Gravellier, Joseph
    Dutertre, Jean-Max
    Teglia, Yannick
    Moundi, Philippe Loubet
    2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2021, : 46 - 55
  • [9] LDSFI: a Lightweight Dynamic Software-based Fault Injection
    Ahmad, Hussein Al-haj
    Sedaghat, Yasser
    Moradiyan, Mahin
    2019 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2019), 2019, : 207 - 213
  • [10] Program Protection through Software-based Hardware Abstraction
    McDonald, J. Todd
    Manikyam, Ramya K.
    Bardin, Sebastien
    Bonichon, Richard
    Andel, Todd R.
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 247 - 258