Vulnerability Analysis for Custom Instructions

  • Authors:
  • Ali Azarpeyvand;Mostafa E. Salehi;Sied Mehdi Fakhraie

  • Affiliations:
  • -;-;-

  • Venue:
  • DSD '12 Proceedings of the 2012 15th Euromicro Conference on Digital System Design
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Today circuits are becoming more vulnerable to electronic noises and reliable system design has emerged as a key challenge to embedded system design. Logic fault in terms of soft errors or transient faults are now a serious problem for embedded processors. Recent developments in customized embedded processors significantly focus on improving the performance and area of the processor by augmenting it with application specific custom functional units that implement custom instructions. This paper analyzes the effect of type, order, and bit-width of the operations of different custom instruction sub-graphs on the vulnerability of extensible processors. We have developed a framework for studying the effects of different operations and their dependencies on overall vulnerability of the custom functional units and our experiments show that, in most cases, similar custom functional units could have different vulnerabilities to soft errors. Our approach enables designers to optionally constrain the operand types and also the custom functional unit structure to reach an acceptable vulnerability.