DocumentCode
2811897
Title
Vulnerability-based Interleaving for Multi-Bit Upset (MBU) protection in modern microprocessors
Author
Maniatakos, Michail ; Michael, Maria K. ; Makris, Yiorgos
Author_Institution
EE Dept., Yale Univ., New Haven, CT, USA
fYear
2012
fDate
5-8 Nov. 2012
Firstpage
1
Lastpage
8
Abstract
We present a novel methodology for protecting incore microprocessor memory arrays from Multiple Bit Upsets (MBUs). Recent radiation studies in modern SRAMs demonstrate that up to 55% of Single Event Upsets (SEUs) due to alpha particle or neutron strikes result in MBUs. Towards suppressing these MBUs, methods such as physical interleaving or periodic scrubbing have been successfully applied to caches. However, these methods are not applicable to in-core, high-performance Content-Addressable Memories (CAM) arrays, due to computational complexity, high delay and area overhead, and lack of information redundancy. To this end, we propose a cost-effective method for enhancing in-core memory array resiliency, called Vulnerability-based Interleaving (VBI). VBI physically disperses bit-lines based on their vulnerability factor and applies selective parity to these lines. Thereby, VBI aims to ensure that an MBU will affect at most one critical bit-field, so that the selective parity will detect the error and a subsequent pipeline flush will remove its effects. Experimental results employing simulation of realistic MBU fault models on the instruction queue of the Alpha 21264 microprocessor in a 65nm process, demonstrate that a 30% selective parity protection of VBI-arranged bit-lines reduces vulnerability by 94%.
Keywords
SRAM chips; computational complexity; content-addressable storage; error detection; microprocessor chips; CAM array; MBU protection; SEU; SRAM; VBI-arranged bit-line; Vulnerability-based Interleaving; alpha particle; computational complexity; error detection; high delay; high-performance content-addressable memory array; incore microprocessor memory array protection; information redundancy; multibit upset protection; neutron; single event upsets; size 65 nm; subsequent pipeline flush; vulnerability-based interleaving; Circuit faults; Computer aided manufacturing; Error correction codes; Layout; Microprocessors; Pipelines; Random access memory;
fLanguage
English
Publisher
ieee
Conference_Titel
Test Conference (ITC), 2012 IEEE International
Conference_Location
Anaheim, CA
ISSN
1089-3539
Print_ISBN
978-1-4673-1594-4
Type
conf
DOI
10.1109/TEST.2012.6401594
Filename
6401594
Link To Document