MARC details
000 -LEADER |
fixed length control field |
nam a22 7a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DUET_LibPGT_2014_08_22 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20170817221340.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
170817b xxu||||| |||| 00| 0 eng d |
027 ## - STANDARD TECHNICAL REPORT NUMBER |
Qualifying information |
DICE 14012 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
KAIST |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
DICE 14012 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Relator code |
Mohammad Abdur Rouf |
245 ## - TITLE STATEMENT |
Title |
Control Flow Vulnerability: Modeling, Evaluation and Low-cost Hardware/Software Solutions. |
Statement of responsibility, etc. |
Mohammad Abdur Rouf |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Korea Adanced Institute of Technology (KAIST) |
Name of publisher, distributor, etc. |
KAIST Library |
Date of publication, distribution, etc. |
23-05-2014 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xi, 111p. : hard binding ; 30 cm |
500 ## - GENERAL NOTE |
General note |
Embedded systems are becoming more susceptible to transient errors because of miniaturization of VLSI circuits and reduction of voltage levels. These errors affect the processor’s pipeline and hence its data and control flows. Data errors are two types: (i) computational errors due to incorrect results from functional units, and (ii) memory errors occur due to corruption of the stored data. However, errors in<br/>control flow can change the program’s execution sequence, which might be catastrophic for safety-critical applications. Vulnerabilities to transient errors in a microprocessor system were previously performed for instruction queues, execution units, register files, read/write buffers, instruction and data caches, and translation look aside buffers. However, control flow vulnerabilities have not been explored extensively. The author makes a model to evaluate the program’s Vulnerability Factor of Control Flow (VFCF) in a pipelined processor. VFCF is investigated for a program under different compiler optimization strategies. It is observed that different programs show various degrees of VFCF against compiler<br/>optimizations flags. To better evaluate the VFCF, author redevelops VFCF model referred to as CFV model which integrates normalized instructions, branches, taken branches and execution cycles. Conventional techniques are either software-based or hardware-based to overcome control flow vulnerabilities.<br/>Software-based techniques suffer from increased code-size overhead and have a negative impact on energy consumption and performance degradation. On the other hand, hardware-based schemes incur high hardware and area costs. Author proposes two low-cost control flow vulnerability reduction mechanisms:<br/>(i) hardware-based low-cost control flow error checking scheme and (ii) code transformation scheme. <br/><br/>Low-cost Control Flow Error Checking (CFEC) scheme is a hardware-based technique that exploits available redundancies in the microprocessor’s pipeline. A<br/>branch target buffer (BTB) stores the target addresses of taken branches, a<br/>short backward branch (SBB) detector stores short backward branch targets and an<br/>arithmetic logic unit (ALU) generates branch target addresses using the low-order<br/>branch displacement bits of branch instructions. The proposed CFEC scheme utilizes these redundancies to detect and recover from control-flow errors in the pipeline with negligible energy overhead of 0.9% and performance overhead of 0.8%, while error coverage ranges from 86% to 99%.<br/><br/>Secondly, the author applies code transformations such as code replication, condition merging, and selected combination of these transformations to application programs. The transformed code with the use of compiler optimization flags reduce CFV significantly. The effects of code transformations on CFV are verified for two embedded architectures: ARM and MIPS. The CFV is reduced by 18% to 98% and<br/>on the average by 62% for ARM programs. In the MIPS programs, CFV is reduced by 55% on the average. The combined reliability and performance metric<br/>CFV × CPI is also reduced by 63% for ARM and by 65% for MIPS. |
505 ## - FORMATTED CONTENTS NOTE |
Uniform Resource Identifier |
<a href="https://drive.google.com/open?id=0B20VKNntsoafT2pNYWc5dW5sbDA">https://drive.google.com/open?id=0B20VKNntsoafT2pNYWc5dW5sbDA</a> |
630 ## - SUBJECT ADDED ENTRY--UNIFORM TITLE |
Language of a work |
English |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Source of heading or term |
Control-flow error |
Form subdivision |
Realiability |
General subdivision |
Low-power |
Chronological subdivision |
Computer Architecture |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Fulltext Available |
Uniform Resource Identifier |
<a href="https://drive.google.com/open?id=0B20VKNntsoafT2pNYWc5dW5sbDA">https://drive.google.com/open?id=0B20VKNntsoafT2pNYWc5dW5sbDA</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Post Graduate Thesis |