[1] |
陆荣,游月辉,吴涛,等. 卫星扩频应答机抗单粒子翻转技术研究[J]. 航天电子对抗, 2016,32(4):52-55.
|
[2] |
MITRA S, SEIFERT N, MING Z, et al. Robust system design with built-in soft-error resilience[J]. Computer, 2005,
|
|
38(2):43-52.
|
[3] |
NATELLA R, COTRONEO D, MADEIRA H. Assessing dependability with software fault injection: A survey[J]. ACM
|
|
Computing Surveys, 2016,48(3):1-55.
|
[4] |
孙峻朝,王建莹,杨孝宗. 故障注入方法与工具的研究现状[J]. 宇航学报, 2001(1):99-104.
|
[5] |
HARI S S, ADVE S V, NAEIMI H, et al. Relyzer: Application resiliency analyzer for transient faults[J]. IEEE Micro, 2013,33(3):58-66.
|
[6] |
HARI S K S, VENKATAGIRI R, ADVE S V, et al. GangES: Gang error simulation for hardware resiliency evaluation[J]. Computer Architecture News, 2014,42(3):61-72.
|
[7] |
CHATZIDIMITRIOU A, BODMANN P, PAPADIMITRIOU G, et al. Demystifying soft error assessment strategies on ARM CPUs:Microarchitectural fault injection vs. neutron beam experiments[C]// 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks(DSN). IEEE, 2019:26-38.
|
[8] |
ARLAT J, AGUERA M. Fault injection for dependability validation: A methodology and some applications[J]. IEEE Transactions on Software Engineering, 1990,16(2):166-182.
|
[9] |
BURGER D C, AUSTIN T M. The SimpleScalar tool Set, Version 2.0[R]. University of Wisconsin-Madison Computer Sciences Department Technical Report #1342, 1997.
|
[10] |
EIDE P, MAYBECK P. An MMAE failure detection system for the F-16[J]. IEEE Transactions on Aerospace & Electronic Systems, 1996,32(3):1125-1136.
|
[11] |
LU Q N, FARAHANI M, WEI J S, et al. LLFI: An intermediate code-level fault injection tool for hardware faults[J]. IEEE International Conference on Software Quality, Reliability and Security. 2015:11-16.
|
[12] |
JIN A, JIANG J H, HU J W, et al. A PIN-based dynamic software fault injection system[C]// Proceedings of the 9th International Conference for Young Computer Scientists. 2008. DOI: 10.1109/ICYCS.2008.329.
|
[13] |
SCHIFFEL U, FETZER C. Hardware fault injection using dynamic binary instrumentation: FITgrind[C]// Proceedings of the 6th European Dependable Computing Conference(EDCC-6). 2006:37-38.
|
[14] |
PARASYRIS K, TZIANTZOULIS G, ANTONOPOULOS C D, et al. GemFI: A fault injection tool for studying the behavior of applications on unreliable substrates[C]// 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 2014:622-629.
|
[15] |
TOPÇU B,ÖZ I. Predicting the soft error vulnerability of GPGPU applications[C]// Proceedings of the 2022 30th Euromicro International Conference on Parallel, Distributed and Network-based Processing(PDP). 2022:108-115.
|
[16] |
YANG L S, NIE B, JOG A, et al. Sugar: Speeding up gpgpu application resilience estimation with input sizing[C]// Proceedings of the ACM on Measurement and Moldeling of Computing Systems(SIGMETRICS’21). 2021. DOI: 10.1145
|
|
/3410220.3453917.
|
[17] |
LI G P, PATTABIRAMAN K, HARI S K S, et al. Modeling soft-error propagation in programs[C]// 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks(DSN). 2018:27-38.
|
[18] |
PREVILON F G, KALRA C, TIWARI D, et al. PCFI: Program counter guided fault injection for accelerating GPU reliability assessment[C]// 2019 Design, Automation & Test in Europe Conference & Exhibition(DATE). 2019:308-311.
|
[19] |
NIE B, YANG L S, JOG A, et al. Fault site pruning for practical reliability analysis of GPGPU applications[C]// 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture(MICRO). 2018:749-761.
|
[20] |
LI Z M, MENON H, DAN M, et al. SpotSDC: Revealing the silent data corruption propagation in high-performance computing systems[J]. IEEE Transactions on Visualization and Computer Graphics, 2021,27(10):3938-3952.
|
[21] |
LU Q N, PATTABIRAMAN K, GUPTA M S, et al. SDCTune: A model for predicting the SDC proneness of an application for configurable protection[C]// Proceedings of the 2014 International Conference on Compilers, Architecture and Synthesis for Embedded Systems. 2014:1-10.
|
[22] |
YANG N, WANG Y. Identify silent data corruption vulnerable instructions using SVM[J]. IEEE Access, 2019,7:40210-40219.
|
[23] |
张倩雯,庄 毅. 基于机器学习的指令脆弱性分析方法[J]. 小型微型计算机系统, 2018,39(4):725-731.
|
[24] |
马骏驰,汪芸. 一种基于不变量的软错误检测方法[J]. 软件学报, 2016,27(2):219-230.
|
[25] |
CHEN T Q, GUESTRIN C. XGBoost: A scalable tree boosting system[C]// Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2016:785-779.
|