2013 IEEE 19th International On-Line Testing Symposium (IOLTS)最新文献

筛选
英文 中文
Video decoder monitoring using non-linear regression 视频解码器的非线性回归监控
2013 IEEE 19th International On-Line Testing Symposium (IOLTS) Pub Date : 2013-07-08 DOI: 10.1109/IOLTS.2013.6604073
Brice Ekobo Akoa, E. Simeu, F. Lebowsky
{"title":"Video decoder monitoring using non-linear regression","authors":"Brice Ekobo Akoa, E. Simeu, F. Lebowsky","doi":"10.1109/IOLTS.2013.6604073","DOIUrl":"https://doi.org/10.1109/IOLTS.2013.6604073","url":null,"abstract":"In this research work, a non-linear regression-based prediction method is incorporated into a digital video decoder loop to monitor the visual quality of videos during the decoding process. Considering well-known video quality metrics, a Video Quality Monitoring Tool (VQMT) has been developed for efficient re-use in a variety of video processing tasks. The idea is based on the fact that when human observers rate video quality, they consider reference aspects such as Noise affecting the video or Neatness of images. In addition, transmission errors such as packet loss rate may impact video quality as well. Therefore, defining a Regression model between each one of these reference aspects and the Mean Opinion Score (MOS) provided by human observers can lead to an automatic way to supervise video decoding quality. Promising results have been achieved using a Non-linear Regression (NLR) method together with fundamental video quality metrics namely PLR (Packet Loss Rate), PSNR (Peak Signal to Noise Ratio), the SI (Spatial Index) and the TI (Temporal Index).","PeriodicalId":423175,"journal":{"name":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116726595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The functional and performance tolerance of GPUs to permanent faults in registers gpu对寄存器中永久故障的功能和性能容忍度
2013 IEEE 19th International On-Line Testing Symposium (IOLTS) Pub Date : 2013-07-08 DOI: 10.1109/IOLTS.2013.6604089
Sotiris Tselonis, Vasilis Dimitsas, D. Gizopoulos
{"title":"The functional and performance tolerance of GPUs to permanent faults in registers","authors":"Sotiris Tselonis, Vasilis Dimitsas, D. Gizopoulos","doi":"10.1109/IOLTS.2013.6604089","DOIUrl":"https://doi.org/10.1109/IOLTS.2013.6604089","url":null,"abstract":"Massively parallel many-core Graphics Processing Unit (GPU) architectures offer significant performance speedup in workloads with thread-level parallelism compared to contemporary multicore CPUs. For this reason, general-purpose computing using GPUs (GPGPU) is a rapidly expanding research direction in different contexts. Unlike graphics processing, GPGPU computing requires reliable operation in the presence of hardware faults whose occurrence probabilities in current and forthcoming advanced manufacturing technologies will be significant. In this paper, we focus on the aspect of tolerance of GPUs to permanent faults in their most critical storage elements: register files. By performing a comprehensive fault injection campaign on a cycle-accurate GPGPU architectural simulator, we first evaluate and classify the behavior of NVIDIA GPU CUDA kernels in the presence of permanent faults in registers. Moreover, we analyze the performance tolerance of GPUs when they operate in degraded mode (less hardware resources, less thread-level parallelism) due to the presence of multiple permanent faults in the registers of their streaming multiprocessors. Our findings confirm the intuitively expected tolerance of these architectures to faults and also quantify it in different configurations and modes.","PeriodicalId":423175,"journal":{"name":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115077763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Accurate alpha soft error rate evaluation in SRAM memories SRAM存储器中精确的alpha软错误率评估
2013 IEEE 19th International On-Line Testing Symposium (IOLTS) Pub Date : 2013-07-08 DOI: 10.1109/IOLTS.2013.6604080
S. Bota, G. Torrens, I. D. Paúl, B. Alorda, L. A. Segura
{"title":"Accurate alpha soft error rate evaluation in SRAM memories","authors":"S. Bota, G. Torrens, I. D. Paúl, B. Alorda, L. A. Segura","doi":"10.1109/IOLTS.2013.6604080","DOIUrl":"https://doi.org/10.1109/IOLTS.2013.6604080","url":null,"abstract":"Radiation sensitivity of SRAM memories is of vital importance in applications demanding high reliability levels. Soft error rates (SER) are usually determined through accelerated tests where target devices are subjected to very high levels of radiation, in order to increase the number of induced events. Two main factors determine the accuracy of this technique, on one hand, when the number of induced events is low the result is subjected to statistical errors, on the other hand, if the number of induced events is high, the probability that each cell experiences more than one event is increased, as a result there is the risk that a fraction of the events will not be counted. In this paper we propose an accelerated test method to determine the soft error rate in SRAM memories from a model based on the evolution of the cell population being at logic zero (or logic one) during the irradiation experiment. This model has been contrasted with experimental results obtaining a very good correlation.","PeriodicalId":423175,"journal":{"name":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127033711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HHC: Hierarchical hardware checkpointing to accelerate fault recovery for SRAM-based FPGAs 分层硬件检查点加速基于sram的fpga的故障恢复
2013 IEEE 19th International On-Line Testing Symposium (IOLTS) Pub Date : 2013-07-08 DOI: 10.1109/IOLTS.2013.6604078
En-Chung Yang, Keheng Huang, Yu Hu, Xiaowei Li, Jian Gong, Hongjin Liu, Bo Liu
{"title":"HHC: Hierarchical hardware checkpointing to accelerate fault recovery for SRAM-based FPGAs","authors":"En-Chung Yang, Keheng Huang, Yu Hu, Xiaowei Li, Jian Gong, Hongjin Liu, Bo Liu","doi":"10.1109/IOLTS.2013.6604078","DOIUrl":"https://doi.org/10.1109/IOLTS.2013.6604078","url":null,"abstract":"As the feature size shrinks to the nanometer scale, SRAM-based FPGAs are increasingly vulnerable to soft errors. Checkpointing is an effective fault recovery technique that can restore the faulty system to its previous fault free state. Since the function of the system needs to be suspended during checkpoint saving and checkpoint restoring, so the Mean Time to Repair (MTTR) of the system is critical to the system performance. In this work, we propose a hierarchical hardware checkpointing (HHC) technique that contains a high-speed on-chip checkpoint and a low-speed off-chip checkpoint to accelerate fault recovery for SRAM-based FPGAs. Most of single event effect (SEE) faults can be recovered by the high-speed on-chip checkpoint, which significantly reduces the MTTR of the system. The memory resource occupation of the on-chip checkpoint is low because HHC only stores the logic states of user bits and check information for configuration bits. Experimental results show that, compared with traditional off-chip checkpoint strategies, the proposed technique can reduce the MTTR of the system by 94.30%. In addition, the memory resource occupation is 11.11% of FPGAs, a little high but can be further optimized.","PeriodicalId":423175,"journal":{"name":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123096008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A low-cost input vector monitoring concurrent BIST scheme 一种低成本输入向量监测并行BIST方案
2013 IEEE 19th International On-Line Testing Symposium (IOLTS) Pub Date : 2013-07-08 DOI: 10.1109/IOLTS.2013.6604074
I. Voyiatzis, C. Efstathiou, C. Sgouropoulou
{"title":"A low-cost input vector monitoring concurrent BIST scheme","authors":"I. Voyiatzis, C. Efstathiou, C. Sgouropoulou","doi":"10.1109/IOLTS.2013.6604074","DOIUrl":"https://doi.org/10.1109/IOLTS.2013.6604074","url":null,"abstract":"Input vector monitoring concurrent BIST schemes perform testing concurrently with the operation of the circuit. In this work a novel input vector monitoring concurrent BIST scheme is presented that compares favorably to previously proposed schemes with respect to the required hardware overhead.","PeriodicalId":423175,"journal":{"name":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114128439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scan attack in presence of mode-reset countermeasure 扫描攻击存在模式重置对抗
2013 IEEE 19th International On-Line Testing Symposium (IOLTS) Pub Date : 2013-07-08 DOI: 10.1109/IOLTS.2013.6604086
Subidh Ali, S. Saeed, O. Sinanoglu, R. Karri
{"title":"Scan attack in presence of mode-reset countermeasure","authors":"Subidh Ali, S. Saeed, O. Sinanoglu, R. Karri","doi":"10.1109/IOLTS.2013.6604086","DOIUrl":"https://doi.org/10.1109/IOLTS.2013.6604086","url":null,"abstract":"Design for testability (DFT) is the most common testing technique used in the modern VLSI industries. However, when this technique is incorporated in a cryptographic circuit, it may open a back door to an attacker. The attacker can get access to the internal scan chains by switching the device from the normal mode to the test mode and then observe the chip content. The scan cells which were originally used to enhance the testability, can thus be misused to access the intermediate results of the cryptographic algorithm running inside the chip. One countermeasure against such attacks is to reset the device whenever there is a switch from the normal mode to the test mode. In this work we are going to analyse this countermeasure and show that it is not completely secure against scan attack. We show that an attack is possible using only the test mode which will bypass the countermeasure.","PeriodicalId":423175,"journal":{"name":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133797737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A radiation tolerant and self-repair memory cell 一种耐辐射和自我修复的记忆细胞
2013 IEEE 19th International On-Line Testing Symposium (IOLTS) Pub Date : 2013-07-08 DOI: 10.1109/IOLTS.2013.6604081
Nikolaos Eftaxiopoulos-Sarris, Georgios Zervakis, Kostas Tsoumanis, K. Pekmestzi
{"title":"A radiation tolerant and self-repair memory cell","authors":"Nikolaos Eftaxiopoulos-Sarris, Georgios Zervakis, Kostas Tsoumanis, K. Pekmestzi","doi":"10.1109/IOLTS.2013.6604081","DOIUrl":"https://doi.org/10.1109/IOLTS.2013.6604081","url":null,"abstract":"In this paper a new radiation tolerant memory cell is proposed. As CMOS technologies scale down, existing hardened cells, which are technology dependent, become more and more vulnerable to radiation effects. We tested some of the most known and effective hardened cells using the SPICE simulator LTspice but no one proved to ensure data integrity. The proposed cell consists of three standard 6T cells and proves to be 100% radiation tolerant in any technology, having however an expected area and power overhead comparing to the 6T and DICE cells. According to simulation results, these overheads are proportional to the number of transistors used, but the read time when no error has occurred and the write time are shorter.","PeriodicalId":423175,"journal":{"name":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116038534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A post-deployment IC trust evaluation architecture 部署后IC信任评估架构
2013 IEEE 19th International On-Line Testing Symposium (IOLTS) Pub Date : 2013-07-08 DOI: 10.1109/IOLTS.2013.6604083
Yier Jin, Dzmitry Maliuk, Y. Makris
{"title":"A post-deployment IC trust evaluation architecture","authors":"Yier Jin, Dzmitry Maliuk, Y. Makris","doi":"10.1109/IOLTS.2013.6604083","DOIUrl":"https://doi.org/10.1109/IOLTS.2013.6604083","url":null,"abstract":"The use of side-channel parametric measurements along with statistical analysis methods for detecting hardware Trojans in fabricated integrated circuits has been studied extensively in recent years, initially for digital designs but recently also for their analog/RF counterparts. Such post-fabrication trust evaluation methods, however, are unable to detect dormant hardware Trojans which are activated after a circuit is deployed in its field of operation. For the latter, an on-chip trust evaluation method is required. To this end, we present a general architecture for post-deployment trust evaluation based on on-chip classifiers. Specifically, we discuss the design of an on-chip analog neural network which can be trained to distinguish trusted from untrusted circuit functionality based on simple measurements obtained via on-chip measurement acquisition sensors. The proposed method is demonstrated using a Trojan-free and two Trojan-infested variants of a wireless cryptographic IC design, as well as a fabricated programmable neural network experimentation chip. As corroborated by the obtained experimental results, two current measurements suffice for the on-chip classifier to effectively assess trustworthiness and, thereby, detect hardware Trojans that are activated after chip deployment.","PeriodicalId":423175,"journal":{"name":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hierarchical RTL-based combinatorial SER estimation 基于分层rtl的组合SER估计
2013 IEEE 19th International On-Line Testing Symposium (IOLTS) Pub Date : 2013-07-08 DOI: 10.1109/IOLTS.2013.6604065
A. Evans, D. Alexandrescu, Enrico Costenaro, Liang Chen
{"title":"Hierarchical RTL-based combinatorial SER estimation","authors":"A. Evans, D. Alexandrescu, Enrico Costenaro, Liang Chen","doi":"10.1109/IOLTS.2013.6604065","DOIUrl":"https://doi.org/10.1109/IOLTS.2013.6604065","url":null,"abstract":"With increased device integration and a gradual trend toward higher operating frequencies, the effect of radiation induced transients in combinatorial logic (SETs) can no longer be ignored. Electrical, logical and temporal masking prevent the majority of SETs from becoming functional failures. Current work on SET analysis starts from a gate-level circuit representation, however, in an industrial design cycle, by the time a gate-level netlist is available, it is too late to make design changes. We propose a hierarchical SET analysis methodology that can be applied at the RTL level. The SET sensitivity of the cell library and the masking characteristics of standard combinatorial design blocks are pre-characterized and stored in compact models. The SET sensitivity of a complex circuit is then calculated by decomposing it into blocks and combining the compact SET models. Experimental results are presented for an ALU implemented in the NanGate library.","PeriodicalId":423175,"journal":{"name":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124807611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Exploiting the debug interface to support on-line test of control flow errors 利用调试接口支持控制流错误的在线测试
2013 IEEE 19th International On-Line Testing Symposium (IOLTS) Pub Date : 2013-07-08 DOI: 10.1109/IOLTS.2013.6604058
B. Du, M. Reorda, L. Sterpone, L. Parra, M. Portela-García, A. Lindoso, L. Entrena
{"title":"Exploiting the debug interface to support on-line test of control flow errors","authors":"B. Du, M. Reorda, L. Sterpone, L. Parra, M. Portela-García, A. Lindoso, L. Entrena","doi":"10.1109/IOLTS.2013.6604058","DOIUrl":"https://doi.org/10.1109/IOLTS.2013.6604058","url":null,"abstract":"Detecting the effects of transient faults is a key point in many safety-critical applications. This paper explores the possibility of using for this purpose the debug interface existing today in several processors/controllers on the market. In this way one can achieve a good detection capability with respect to control flow errors with very small latency, while the cost for adopting the proposed technique is rather limited and does not involve any change either in the processor hardware or in the application software. The method works even if the processor uses caches. Experimental results are reported, showing both the advantages and the costs of the method.","PeriodicalId":423175,"journal":{"name":"2013 IEEE 19th International On-Line Testing Symposium (IOLTS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117011422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信