A Single Event Soft Error Vulnerability Identification Method Applicable to Processor System

A processor system and identification method technology, applied in software testing/debugging and other directions, can solve problems such as high fault test coverage requirements, weak application scope and versatility, and difficult technical implementation.

Active Publication Date: 2016-08-17
XIAN INSTITUE OF SPACE RADIO TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first type of fault test program design is to use fault injection simulation to complete the identification and analysis of vulnerable points, so this type of technology has high requirements for the grasp of the functional structure characteristics of the system and the coverage of fault tests
When faced with a system design with a complex structure, the application of this type of technology is difficult and the implementation complexity is high
The modeling and design of the second test algorithm is to analyze the loopholes in the program design. In the code area in the middle of the program, the method of loading dynamic test programs is used to complete the software vulnerability analysis. Therefore, this type of technology needs to study different design code styles and carry out separate Debugging and technical implementation are more difficult
When faced with complex structural design, there are disadvantages of weak application range and versatility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Single Event Soft Error Vulnerability Identification Method Applicable to Processor System
  • A Single Event Soft Error Vulnerability Identification Method Applicable to Processor System
  • A Single Event Soft Error Vulnerability Identification Method Applicable to Processor System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Specific embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0053] Such as figure 1 As shown, the present invention is applicable to a single event soft error vulnerability identification method of a processor system, including the following three stages:

[0054] Stage 1: Meta-circuit node division: According to the functional design architecture of the system, analyze the code structure, and complete the mapping of the function segment of the pre-compiled code (such as C language code) and the instruction sequence set completed by the compiler to complete the meta-circuit node Division; the meta-circuit is a specific function or sub-function module that completes the precompiled code or instruction sequence; stage 1 includes specific implementation steps (1)-(3).

[0055] Stage 2: Construction of the signal propagation network diagram; use the meta-circuit nodes divided in stage 1 to constru...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method applied to recognizing vulnerabilities of single-event soft errors in processor systems includes: based on influences of single-event soft error protective design upon system performance and resources, establishing an importance function module for vulnerability recognition model analytic protection; according to an operating principle of compilation instructions, dividing an element circuit node (a specific function / subfunction module used for pre-compiling codes or instruction sequences) from code level of design, extracting vulnerability factors of the element circuit node from instruction level by compile mapping relation, and performing grade domain division; finally, subjecting uncertainty intervals (gray level intervals) of vulnerability factor grading for the element circuit node to credibility evaluation according to a gray level system theory, and acquiring computation results according to grade credibility sorting. The method has the advantages that the simple vulnerability analysis method for processor systems is provided, system cost and performance loss are reduced on the premise of implementing reliability, and system protection effect is improved.

Description

technical field [0001] The invention relates to a single-event soft-error vulnerable point identification method applicable to a processor system, and belongs to the technical field of system anti-single event effect fault tolerance. Background technique [0002] In space applications, processor systems are widely used in data and information processing fields such as high-speed data transmission, signal communication, and navigation processing. However, system design using single-event protection measures will sacrifice system performance and resources, and inhibit the effective use of system performance. Therefore, under the premise that resource overhead and performance requirements deviate, the vulnerability identification modeling method will provide guidance for the design of an effective single event soft error protection scheme for the processor system, and realize the high reliability design of the processor system. [0003] The current related technologies mainly f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
Inventor 高翔周国昌赖晓玲朱启巨艇贾亮杨玉辰
Owner XIAN INSTITUE OF SPACE RADIO TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products