{"id":"https://openalex.org/W2171617263","doi":"https://doi.org/10.1145/1755888.1755910","title":"Cache vulnerability equations for protecting data in embedded processor caches from soft errors","display_name":"Cache vulnerability equations for protecting data in embedded processor caches from soft errors","publication_year":2010,"publication_date":"2010-04-13","ids":{"openalex":"https://openalex.org/W2171617263","doi":"https://doi.org/10.1145/1755888.1755910","mag":"2171617263"},"language":"en","primary_location":{"id":"doi:10.1145/1755888.1755910","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1755888.1755910","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM SIGPLAN/SIGBED 2010 conference on Languages, compilers, and tools for embedded systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044172378","display_name":"Aviral Shrivastava","orcid":"https://orcid.org/0000-0002-1075-897X"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Aviral Shrivastava","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100780257","display_name":"Jongeun Lee","orcid":"https://orcid.org/0000-0003-1523-2974"},"institutions":[{"id":"https://openalex.org/I48566637","display_name":"Ulsan National Institute of Science and Technology","ror":"https://ror.org/017cjz748","country_code":"KR","type":"education","lineage":["https://openalex.org/I48566637"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jongeun Lee","raw_affiliation_strings":["Ulsan National Institute of Science and Technology, Ulsan, South Korea"],"affiliations":[{"raw_affiliation_string":"Ulsan National Institute of Science and Technology, Ulsan, South Korea","institution_ids":["https://openalex.org/I48566637"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015230101","display_name":"Reiley Jeyapaul","orcid":"https://orcid.org/0000-0002-3774-1916"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Reiley Jeyapaul","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044172378"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":2.935,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.91680053,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"143","last_page":"152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8470635414123535},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.8020080327987671},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7565011382102966},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7311826944351196},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6386955380439758},{"id":"https://openalex.org/keywords/soft-error","display_name":"Soft error","score":0.6172069311141968},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4354119598865509},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34277862310409546},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23916935920715332},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17309415340423584}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8470635414123535},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.8020080327987671},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7565011382102966},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7311826944351196},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6386955380439758},{"id":"https://openalex.org/C154474529","wikidata":"https://www.wikidata.org/wiki/Q1658917","display_name":"Soft error","level":2,"score":0.6172069311141968},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4354119598865509},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34277862310409546},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23916935920715332},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17309415340423584},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1755888.1755910","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1755888.1755910","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM SIGPLAN/SIGBED 2010 conference on Languages, compilers, and tools for embedded systems","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarworks.unist.ac.kr:201301/32408","is_oa":false,"landing_page_url":"https://dl.acm.org/citation.cfm?doid=1755888.1755910","pdf_url":null,"source":{"id":"https://openalex.org/S4306401118","display_name":"Scholarworks@UNIST (Ulsan National Institute of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I48566637","host_organization_name":"Ulsan National Institute of Science and Technology","host_organization_lineage":["https://openalex.org/I48566637"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"CONFERENCE"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W68041361","https://openalex.org/W1500893261","https://openalex.org/W1821730155","https://openalex.org/W1935014183","https://openalex.org/W1945100066","https://openalex.org/W2010175277","https://openalex.org/W2032094184","https://openalex.org/W2034593585","https://openalex.org/W2047171058","https://openalex.org/W2052153312","https://openalex.org/W2065705265","https://openalex.org/W2097018539","https://openalex.org/W2097699872","https://openalex.org/W2099744220","https://openalex.org/W2116244405","https://openalex.org/W2118629573","https://openalex.org/W2119609467","https://openalex.org/W2121045100","https://openalex.org/W2127745296","https://openalex.org/W2129273780","https://openalex.org/W2133971626","https://openalex.org/W2139416948","https://openalex.org/W2142252451","https://openalex.org/W2144788518","https://openalex.org/W2146589391","https://openalex.org/W2147543317","https://openalex.org/W2149017595","https://openalex.org/W2152452249","https://openalex.org/W2152879656","https://openalex.org/W2153554709","https://openalex.org/W2160802886","https://openalex.org/W2160993194","https://openalex.org/W2162465831","https://openalex.org/W2165820775","https://openalex.org/W2169213530","https://openalex.org/W2332870143","https://openalex.org/W3010182501","https://openalex.org/W4245394119","https://openalex.org/W6638337804"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W2906845177","https://openalex.org/W4200107511","https://openalex.org/W2891427086","https://openalex.org/W1968625315"],"abstract_inverted_index":{"Continuous":[0],"technology":[1],"scaling":[2],"has":[3,59],"brought":[4],"us":[5],"to":[6,15,29,51,62,79,131,151,164,181,191,201,219],"a":[7,143],"point,":[8],"where":[9],"transistors":[10],"have":[11,48],"become":[12],"extremely":[13],"susceptible":[14],"cosmic":[16],"radiation":[17],"strikes,":[18],"or":[19],"soft":[20,30,80,116,135],"errors.":[21],"Inside":[22],"the":[23,64,70,83,92,106,115,123,134,189,193,209],"processor,":[24,93],"caches":[25],"are":[26,160],"most":[27],"vulnerable":[28,78],"errors,":[31],"and":[32,46,94],"techniques":[33,163,207],"at":[34],"various":[35],"levels":[36],"of":[37,66,72,109,119,138,167],"design":[38],"abstraction,":[39],"e.g.,":[40],"fabrication,":[41],"gate":[42],"design,":[43,45],"circuit":[44],"microarchitecture-level,":[47],"been":[49,60],"developed":[50],"protect":[52],"data":[53,73,140,168],"in":[54,74,82,122,169,185,196],"caches.":[55,75,170],"However,":[56,146],"no":[57,161],"work":[58],"done":[61],"investigate":[63],"effect":[65,114],"code":[67,102],"transformations":[68,103],"on":[69],"vulnerability":[71,118,137,166,184,212],"Data":[76],"is":[77,156],"errors":[81],"cache":[84,139],"only":[85],"if":[86,96,148],"it":[87,97,155],"will":[88,98],"be":[89,99],"read":[90],"by":[91,141],"not":[95],"overwritten.":[100],"Since":[101],"can":[104],"change":[105],"read-write":[107],"pattern":[108],"program":[110,120,183,221],"variables,":[111],"they":[112],"significantly":[113,132],"error":[117,136],"variables":[121],"cache.":[124],"We":[125],"observe":[126],"that":[127,214],"often":[128],"opportunity":[129],"exists":[130],"reduce":[133,220],"trading-off":[142],"little":[144],"performance.":[145],"even":[147],"one":[149],"wanted":[150],"exploit":[152,192],"this":[153,172,174],"trade-off,":[154],"difficult,":[157],"since":[158],"there":[159],"efficient":[162,177],"estimate":[165,182],"To":[171],"end,":[173],"paper":[175],"develops":[176],"static":[178,205],"analysis":[179,206],"method":[180],"caches,":[186],"which":[187],"enables":[188],"compiler":[190],"performance-vulnerability":[194],"trade-offs":[195],"applications.":[197],"Finally,":[198],"as":[199],"compared":[200],"simulation":[202],"based":[203],"estimation,":[204],"provide":[208,215],"insights":[210],"into":[211],"calculations":[213],"some":[216],"simple":[217],"schemes":[218],"vulnerability.":[222]},"counts_by_year":[{"year":2021,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
