Central Library

Dhaka University of Engineering and Technology, Gazipur

ঢাকা প্রকৌশল ও প্রযুক্তি বিশ্ববিদ্যালয়, গাজীপুর

Control Flow Vulnerability: Modeling, Evaluation and Low-cost Hardware/Software Solutions. (Record no. 25)

MARC details
000 -LEADER
fixed length control field nam a22 7a 4500
003 - CONTROL NUMBER IDENTIFIER
control field DUET_LibPGT_2014_08_22
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170817221340.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170817b xxu||||| |||| 00| 0 eng d
027 ## - STANDARD TECHNICAL REPORT NUMBER
Qualifying information DICE 14012
040 ## - CATALOGING SOURCE
Transcribing agency KAIST
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number DICE 14012
100 ## - MAIN ENTRY--PERSONAL NAME
Relator code Mohammad Abdur Rouf
245 ## - TITLE STATEMENT
Title Control Flow Vulnerability: Modeling, Evaluation and Low-cost Hardware/Software Solutions.
Statement of responsibility, etc. Mohammad Abdur Rouf
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Korea Adanced Institute of Technology (KAIST)
Name of publisher, distributor, etc. KAIST Library
Date of publication, distribution, etc. 23-05-2014
300 ## - PHYSICAL DESCRIPTION
Extent xi, 111p. : hard binding ; 30 cm
500 ## - GENERAL NOTE
General note Embedded systems are becoming more susceptible to transient errors because of miniaturization of VLSI circuits and reduction of voltage levels. These errors affect the processor’s pipeline and hence its data and control flows. Data errors are two types: (i) computational errors due to incorrect results from functional units, and (ii) memory errors occur due to corruption of the stored data. However, errors in<br/>control flow can change the program’s execution sequence, which might be catastrophic for safety-critical applications. Vulnerabilities to transient errors in a microprocessor system were previously performed for instruction queues, execution units, register files, read/write buffers, instruction and data caches, and translation look aside buffers. However, control flow vulnerabilities have not been explored extensively. The author makes a model to evaluate the program’s Vulnerability Factor of Control Flow (VFCF) in a pipelined processor. VFCF is investigated for a program under different compiler optimization strategies. It is observed that different programs show various degrees of VFCF against compiler<br/>optimizations flags. To better evaluate the VFCF, author redevelops VFCF model referred to as CFV model which integrates normalized instructions, branches, taken branches and execution cycles. Conventional techniques are either software-based or hardware-based to overcome control flow vulnerabilities.<br/>Software-based techniques suffer from increased code-size overhead and have a negative impact on energy consumption and performance degradation. On the other hand, hardware-based schemes incur high hardware and area costs. Author proposes two low-cost control flow vulnerability reduction mechanisms:<br/>(i) hardware-based low-cost control flow error checking scheme and (ii) code transformation scheme. <br/><br/>Low-cost Control Flow Error Checking (CFEC) scheme is a hardware-based technique that exploits available redundancies in the microprocessor’s pipeline. A<br/>branch target buffer (BTB) stores the target addresses of taken branches, a<br/>short backward branch (SBB) detector stores short backward branch targets and an<br/>arithmetic logic unit (ALU) generates branch target addresses using the low-order<br/>branch displacement bits of branch instructions. The proposed CFEC scheme utilizes these redundancies to detect and recover from control-flow errors in the pipeline with negligible energy overhead of 0.9% and performance overhead of 0.8%, while error coverage ranges from 86% to 99%.<br/><br/>Secondly, the author applies code transformations such as code replication, condition merging, and selected combination of these transformations to application programs. The transformed code with the use of compiler optimization flags reduce CFV significantly. The effects of code transformations on CFV are verified for two embedded architectures: ARM and MIPS. The CFV is reduced by 18% to 98% and<br/>on the average by 62% for ARM programs. In the MIPS programs, CFV is reduced by 55% on the average. The combined reliability and performance metric<br/>CFV × CPI is also reduced by 63% for ARM and by 65% for MIPS.
505 ## - FORMATTED CONTENTS NOTE
Uniform Resource Identifier <a href="https://drive.google.com/open?id=0B20VKNntsoafT2pNYWc5dW5sbDA">https://drive.google.com/open?id=0B20VKNntsoafT2pNYWc5dW5sbDA</a>
630 ## - SUBJECT ADDED ENTRY--UNIFORM TITLE
Language of a work English
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Source of heading or term Control-flow error
Form subdivision Realiability
General subdivision Low-power
Chronological subdivision Computer Architecture
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Fulltext Available
Uniform Resource Identifier <a href="https://drive.google.com/open?id=0B20VKNntsoafT2pNYWc5dW5sbDA">https://drive.google.com/open?id=0B20VKNntsoafT2pNYWc5dW5sbDA</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Post Graduate Thesis
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
    Dewey Decimal Classification     Central Library Central Library 4F 17/08/2017   DICE.14012 10000709 17/08/2017 17/08/2017 Post Graduate Thesis Dr. M. A. Rouf's Ph.D. Thesis

Powered by Koha