Fingerprinting Summarizes the History of Internal Processor State Updates into a Cryptographic Signature. the Processors in a Dual Modular Redundant Pair Periodically Exchange and Compare Fingerprints to Corroborate
نویسندگان
چکیده
Recent studies suggest that the softerror rate in microprocessor logic is likely to become a serious reliability concern by 2010. Detecting soft errors in the processor’s core logic presents a new challenge beyond what error-detecting and correcting codes can handle. Currently, commercial microprocessor systems that require an assurance of reliability employ an error-detection scheme based on dual modular redundancy (DMR) in some form—from replicated pipelines within the same die to mirroring of complete processors. These solutions, however, typically require drastic modifications in hardware and/or software to detect and recover from errors. Moreover, current designs rely on tight hardware integration of the DMR processor pair and high interprocessor communication bandwidth, which preclude cost-effective and scalable server architectures. The TRUSS (Total Reliability Using Scalable Servers) project, is building a cost-effective, reliable server architecture from a tightly coupled cluster of rack-mounted server blades. The TRUSS architecture adds support for reliability with minimal changes to the commodity hardware and no changes to the application software. By enforcing distributed redundancy at all processing and storage levels, the TRUSS system can survive any single component failure (memory device, processor, or system ASIC). In the TRUSS architecture, a DMR processor pair is split across different nodes in a system area network. This distributed redundancy provides greater reliability but requires implementing DMR error detection under the limited communication bandwidth and nonnegligible communication latency of the system area network. To detect errors across a distributed DMR pair, we developed fingerprinting, a technique that summarizes a processor’s execution history into a cryptographic signature, or “fingerprint.” More specifically, a fingerprint is a hash value computed on the changes to a processor’s architectural state resulting from a program’s execution. The mirrored processors in a DMR pair exchange and compare a small fingerprint to Jared C. Smolens Brian T. Gold Jangwoo Kim Babak Falsafi James C. Hoe Andreas G. Nowatzyk
منابع مشابه
Fingerprinting: Hash-Based Error Detection in Microprocessors
Today’s commodity processors are tuned primarily for performance and power. As CMOS scaling continues into the deep sub-micron regime, soft errors and device wearout will increasingly jeopardize the reliability of unprotected processor pipelines. To preserve reliable operation, processor cores will require mechanisms to detect errors affecting the control and datapaths. Conventional techniques ...
متن کاملFingerprinting Across On-Chip Memory Interconnects
Pairs of cores in a chip multiprocessor (CMP) can execute programs redundantly to detect and recover from soft errors. Prior work assumes dedicated cross-core buses to compare the redundant cores’ outputs for error detection. In this paper, we investigate using the CMP’s existing on-chip memory interconnect for comparing hashes of architectural state updates, called fingerprints, across redunda...
متن کاملAn Effective Hybrid Genetic Algorithm for Hybrid Flow Shops with Sequence Dependent Setup Times and Processor Blocking
Hybrid flow-shop or flexible flow shop problems have remained subject of intensive research over several years. Hybrid flow-shop problems overcome one of the limitations of the classical flow-shop model by allowing parallel processors at each stage of task processing. In many papers the assumptions are generally made that there is unlimited storage available between stages and the setup times a...
متن کاملUltra-Low-Energy DSP Processor Design for Many-Core Parallel Applications
Background and Objectives: Digital signal processors are widely used in energy constrained applications in which battery lifetime is a critical concern. Accordingly, designing ultra-low-energy processors is a major concern. In this work and in the first step, we propose a sub-threshold DSP processor. Methods: As our baseline architecture, we use a modified version of an existing ultra-low-power...
متن کاملSource Fingerprinting of Sediment Deposited in the Dam Reservoir: A Case of Lavar Dam Watershed, Fin, Hormozgan Province
Extended abstract 1. Introduction Soil erosion is a major environmental threat worldwide. This three-stage process including detachment, transportation and sedimentation of soil particle by runoff affects natural and agricultural areas of Iran. Soil erosion has many off-site and on-site effects such as sediment deposition in the lake of dam and channels, transportation of nutrients and contam...
متن کامل