29.01.2015 Views

Embedded Software for SoC - Grupo de Mecatrônica EESC/USP

Embedded Software for SoC - Grupo de Mecatrônica EESC/USP

Embedded Software for SoC - Grupo de Mecatrônica EESC/USP

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Detecting Soft Errors by a Purely <strong>Software</strong> Approach 49<br />

Table 4-5. Detection efficiency and error rate <strong>for</strong> both program versions.<br />

Detection Efficiency ()<br />

Error Rate (t)<br />

CMA Original<br />

none<br />

17.89 %<br />

CMA Har<strong>de</strong>ned<br />

55.97 %<br />

1.18%<br />

co<strong>de</strong>. This results show that about 60% of injected faults changing the<br />

program’s behavior have been <strong>de</strong>tected and a significant <strong>de</strong>crease of error<br />

rate (about 17 times) <strong>for</strong> the har<strong>de</strong>ned application.<br />

3.1.3. Fault injection in the data memory area<br />

When faults have been injected in the data segment area (results illustrated<br />

in Table 4-6)‚ the har<strong>de</strong>ned CMA program was able to provi<strong>de</strong> 100% <strong>de</strong>tection<br />

efficiency. It is important to note that output data (program results) were<br />

located in a “non targeted” zone aiming at being as close as possible to a real<br />

situation where output samples will get out the equalizer by means of parallel<br />

or serial ports without residing in any internal RAM zone.<br />

Table 4-6. Experimental results – faults injected in the data segment area.<br />

Program version<br />

#Injected<br />

faults<br />

#Effect<br />

less<br />

Detected-faults<br />

#<strong>Software</strong><br />

<strong>de</strong>tection<br />

#Hardware<br />

<strong>de</strong>tection<br />

Un<strong>de</strong>tected-faults<br />

#Incorrect<br />

answer<br />

#Loss<br />

sequence<br />

Original CMA<br />

Har<strong>de</strong>ned CMA<br />

5000<br />

10000<br />

4072<br />

(81.44%)<br />

6021<br />

(60.21%)<br />

–<br />

3979<br />

(39.79%)<br />

–<br />

_<br />

928<br />

(18.56%)<br />

_<br />

–<br />

_<br />

3.2. Preliminary radiation testing campaign<br />

To confirm the results gathered from fault injection experiments‚ we per<strong>for</strong>med<br />

a radiation test campaign. The radiation experiments consisted in exposing<br />

only the processor to the charged particles issued from a Cali<strong>for</strong>nium (Cf225)<br />

source while executing both versions of the CMA program. Table 4-7 shows<br />

the main features of the radiation experiments.<br />

Table 4-7. Main characteristics <strong>for</strong> the radiation test campaign.<br />

Program version<br />

Flux<br />

Estimated upsets<br />

Exposure time<br />

Original CMA<br />

Har<strong>de</strong>ned CMA<br />

285<br />

285<br />

387<br />

506<br />

525<br />

660

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!