Instruction SDC Vulnerability Prediction Using Long Short-Term Memory Neural Network
Silent Data Corruption (SDC) is one of the serious issues in soft errors and it is difficult to detect because it can cause erroneous results without any indication. In order to solve this problem, a new SDC vulnerability prediction method based on deep learning model is proposed. Our method predicts the SDC vulnerability of each instruction in the program based on the inherent and dependent features of each instruction in the Lower Level Virtual Machine (LLVM) intermediate. Firstly, the features are extracted from benchmarks by LLVM passes and feature selection is performed. Then, LLVM Based Fault Injection Tool (LLFI) is used to get SDC vulnerability labels to obtain the SDC prediction data set. Long Short-Term Memory (LSTM) neural network is applied to classification of SDC vulnerability. Finally, compared with the model based on SVM and Decision Tree, the experiment results show that the average accuracy of LSTM in classification of SDC vulnerability is 11.73% higher than SVM, and 10.74% higher than Decision Tree.
KeywordsLSTM Silent data corruption Fault injection Prediction
This paper is supported by the Fundamental Research Funds for the Central Universities (NS 2015092).
- 1.Walter, J.P., Zick, K.M., French, M.: A practical characterization of a NASA spacecube application through fault emulation and laser testing. In: IEEE International Conference on Dependable Systems and Networks, pp. 1–8 (2013)Google Scholar
- 2.Reis, G.A., Chang, J., Vachharajani, N., Rangan, R.: SWIFT: software implemented fault tolerance. In: International Symposium on Code Generation and Optimization, pp. 243–254 (2005)Google Scholar
- 3.Hari, S.K.S., Adve, S.V., Naeimi, H.: Low-cost program-level detectors for reducing silent data corruptions. In: IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 1–12 (2012)Google Scholar
- 4.Lu, Q., Pattabiraman, K., Gupta, M.S.: SDCTune: a model for predicting the SDC proneness of an application for configurable protection. In: International Conference on Compilers, Architecture and Synthesis for Embedded Systems, pp. 1–10 (2015)Google Scholar
- 7.Bernick, D., Bruckert, B., Vigna, P.D.: NonStop® advanced architecture. In: International Conference on Dependable Systems and Networks, pp. 12–21 (2005)Google Scholar
- 9.Thomas, A., Pattabiraman, K.: Error detector placement for soft computation. In: 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 1–12 (2013)Google Scholar
- 10.Laguna, I., Schulz, M., Richards, D.F.: IPAS: intelligent protection against silent output corruption in scientific applications. In: IEEE/ACM International Symposium on Code Generation and Optimization (CGO), pp. 227–238 (2016)Google Scholar
- 13.Yue, L., Chen, W.T., Li, X., Zuo, W.L., Yin, M.H.: A survey of sentiment analysis in social media. Knowl. Inf. Syst. 1–47 (2018)Google Scholar