Instruction SDC Vulnerability Prediction Using Long Short-Term Memory Neural Network

被引:2
作者
Liu, Yunfei [1 ]
Li, Jing [1 ]
Zhuang, Yi [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
来源
ADVANCED DATA MINING AND APPLICATIONS, ADMA 2018 | 2018年 / 11323卷
关键词
LSTM; Silent data corruption; Fault injection; Prediction;
D O I
10.1007/978-3-030-05090-0_12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Silent Data Corruption (SDC) is one of the serious issues in soft errors and it is difficult to detect because it can cause erroneous results without any indication. In order to solve this problem, a new SDC vulnerability prediction method based on deep learning model is proposed. Our method predicts the SDC vulnerability of each instruction in the program based on the inherent and dependent features of each instruction in the Lower Level Virtual Machine (LLVM) intermediate. Firstly, the features are extracted from benchmarks by LLVM passes and feature selection is performed. Then, LLVM Based Fault Injection Tool (LLFI) is used to get SDC vulnerability labels to obtain the SDC prediction data set. Long Short-Term Memory (LSTM) neural network is applied to classification of SDC vulnerability. Finally, compared with the model based on SVM and Decision Tree, the experiment results show that the average accuracy of LSTM in classification of SDC vulnerability is 11.73% higher than SVM, and 10.74% higher than Decision Tree.
引用
收藏
页码:140 / 149
页数:10
相关论文
共 14 条
[1]   NonStop advanced architecture [J].
Bernick, D ;
Bruckert, B ;
Del Vigna, P ;
Garcia, D ;
Jardine, R ;
Klecka, J ;
Smullen, J .
2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, :12-21
[2]  
Chen W., 2018, P 2018 SIAM INT C DA, P279
[3]   Checkpointing for Peta-scale systems: A look into the future of practical rollback-recovery [J].
Elnozahy, EN ;
Plank, JS .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (02) :97-108
[4]   A Soft-Error Mitigated Microprocessor With Software Controlled Error Reporting and Recovery [J].
Farnsworth, Chad ;
Clark, Lawrence T. ;
Gogulamudi, Anudeep R. ;
Vashishtha, Vinay ;
Gujja, Aditya .
IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 2016, 63 (04) :2241-2249
[5]   LSTM: A Search Space Odyssey [J].
Greff, Klaus ;
Srivastava, Rupesh K. ;
Koutnik, Jan ;
Steunebrink, Bas R. ;
Schmidhuber, Juergen .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (10) :2222-2232
[6]  
Hari SKS, 2012, I C DEPEND SYS NETWO
[7]   IPAS: Intelligent Protection against Silent Output Corruption in Scientific Applications [J].
Laguna, Ignacio ;
Schulz, Martin ;
Richards, David F. ;
Calhoun, Jon ;
Olson, Luke .
PROCEEDINGS OF CGO 2016: THE 14TH INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2016, :227-238
[8]   SDCTune: A Model for Predicting the SDC Proneness of an Application for Configurable Protection [J].
Lu, Qining ;
Pattabiraman, Karthik ;
Gupta, Meeta S. ;
Rivers, Jude A. .
2014 INTERNATIONAL CONFERENCE ON COMPILERS, ARCHITECTURE AND SYNTHESIS FOR EMBEDDED SYSTEMS (CASES), 2014,
[9]   SWIFT: Software implemented fault tolerance [J].
Reis, GA ;
Chang, J ;
Vachharajani, N ;
Rangan, R ;
August, DI .
CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, :243-254
[10]   Automatic instruction-level software-only recovery [J].
Reis, George A. ;
Chang, Jonathan ;
August, David I. .
IEEE MICRO, 2007, 27 (01) :36-47