SDC vulnerability prediction method based on instruction feature importance

A technology of command features and prediction methods, which is applied in the direction of instruments, calculations, character and pattern recognition, etc., can solve the problems of large time cost, reduce memory consumption, and improve prediction accuracy

Pending Publication Date: 2022-05-17
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for SDC detection, a large number

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SDC vulnerability prediction method based on instruction feature importance
  • SDC vulnerability prediction method based on instruction feature importance
  • SDC vulnerability prediction method based on instruction feature importance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0043] In one embodiment, combined with figure 1 , providing a method for predicting SDC vulnerability based on the importance of instruction features, the method comprising the following steps:

[0044] Step 1, perform instruction feature extraction on the complex program at the LLVM intermediate code level, and generate the instruction SDC vulnerability feature T;

[0045] Step 2, use the LLFI fault injection tool to simulate unit flipping to randomly inject faults into complex programs, and calculate the SDC sensitivity factor factor(I i ) and SDC probability P SDC (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SDC vulnerability prediction method based on instruction feature importance. The method comprises the following steps: performing instruction feature extraction on a complex program; random fault injection is carried out on the complex program, and an instruction SDC vulnerability value is obtained; measuring the importance degree of the instruction SDC vulnerability feature T to an SDC vulnerability value based on a Gini coefficient, and constructing an instruction feature importance evaluation coefficient; the instruction feature importance is fused into the discourse right of each sub-decision tree of LightGBM, and a new discourse right omega is generated to improve the prediction precision of the instruction SDC vulnerability. Based on an improved LightGBM algorithm, constructing and training an SDC vulnerability prediction model based on instruction feature importance; and performing instruction SDC vulnerability prediction on the to-be-predicted program by the obtained final SDC vulnerability prediction model. Compared with other methods, the method has higher vulnerability prediction precision, can effectively reduce memory consumption and calculation cost, can be applied to standard data types and mixed data types, and has the advantages of light weight, high interpretation and the like.

Description

technical field [0001] The invention belongs to the field of software detection and reinforcement, reliability and security, in particular to an SDC vulnerability prediction method, system, computer equipment and storage medium based on the importance of instruction features. Background technique [0002] With the rapid development of 5G communication, the integration of transistors in the chip manufacturing process is getting higher and higher. These chips are widely used in industrial automation, medical services, smart home and other fields. However, soft errors (e.g. signal or data errors) are likely to result due to huge resource consumption (e.g. CPU cores and memory) in various devices. Among them, silent data corruption (SDC) is the most dangerous error among soft errors, which manifests as a bit flip phenomenon in multi-control, distributed storage, and public cloud storage but cannot be caught by the system. Therefore, establishing an SDC detection model accurate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62
CPCG06F18/24323G06F18/253G06F18/214
Inventor 顾晶晶方文涛
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products