BEC: Bit-Level Static Analysis for Reliability against Soft Errors
- URL: http://arxiv.org/abs/2401.05753v1
- Date: Thu, 11 Jan 2024 09:03:47 GMT
- Title: BEC: Bit-Level Static Analysis for Reliability against Soft Errors
- Authors: Yousun Ko and Bernd Burgstaller
- Abstract summary: We propose a bit-level error coalescing (BEC) static program analysis to understand and improve program reliability against soft errors.
BEC analysis tracks each bit corruption in the register file and classifies the effect of the corruption by its semantics at compile time.
The proposed method is generic and not limited to a specific computer architecture.
- Score: 0.26107298043931204
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Soft errors are a type of transient digital signal corruption that occurs in
digital hardware components such as the internal flip-flops of CPU pipelines,
the register file, memory cells, and even internal communication buses. Soft
errors are caused by environmental radioactivity, magnetic interference,
lasers, and temperature fluctuations, either unintentionally, or as part of a
deliberate attempt to compromise a system and expose confidential data.
We propose a bit-level error coalescing (BEC) static program analysis and its
two use cases to understand and improve program reliability against soft
errors. The BEC analysis tracks each bit corruption in the register file and
classifies the effect of the corruption by its semantics at compile time. The
usefulness of the proposed analysis is demonstrated in two scenarios, fault
injection campaign pruning, and reliability-aware program transformation.
Experimental results show that bit-level analysis pruned up to 30.04 % of
exhaustive fault injection campaigns (13.71 % on average), without loss of
accuracy. Program vulnerability was reduced by up to 13.11 % (4.94 % on
average) through bit-level vulnerability-aware instruction scheduling. The
analysis has been implemented within LLVM and evaluated on the RISC-V
architecture.
To the best of our knowledge, the proposed BEC analysis is the first
bit-level compiler analysis for program reliability against soft errors. The
proposed method is generic and not limited to a specific computer architecture.
Related papers
- The Hitchhiker's Guide to Program Analysis, Part II: Deep Thoughts by LLMs [17.497629884237647]
BugLens is a post-refinement framework that significantly improves static analysis precision.
It raises precision from 0.10 (raw) and 0.50 (semi-automated refinement) to 0.72, substantially reducing false positives.
Our results suggest that a structured LLM-based workflow can meaningfully enhance the effectiveness of static analysis tools.
arXiv Detail & Related papers (2025-04-16T02:17:06Z) - Efficient Symbolic Execution of Software under Fault Attacks [6.333695701603308]
Fault attacks leverage physically injected hardware faults to break the safety of a software program.
Existing methods for analyzing the impact of faults on software suffer from inaccurate fault modeling and inefficient analysis algorithms.
We propose a fault modeling technique that leverages program transformation to add symbolic variables to the program, to accurately model the fault-induced program behavior.
Second, we propose a redundancy pruning technique that leverages the weakest precondition and fault saturation to mitigate path explosion.
arXiv Detail & Related papers (2025-03-20T03:19:48Z) - Beyond the Edge of Function: Unraveling the Patterns of Type Recovery in Binary Code [55.493408628371235]
We propose ByteTR, a framework for recovering variable types in binary code.
In light of the ubiquity of variable propagation across functions, ByteTR conducts inter-procedural analysis to trace variable propagation and employs a gated graph neural network to capture long-range data flow dependencies for variable type recovery.
arXiv Detail & Related papers (2025-03-10T12:27:05Z) - ReF Decompile: Relabeling and Function Call Enhanced Decompile [50.86228893636785]
The goal of decompilation is to convert compiled low-level code (e.g., assembly code) back into high-level programming languages.
This task supports various reverse engineering applications, such as vulnerability identification, malware analysis, and legacy software migration.
arXiv Detail & Related papers (2025-02-17T12:38:57Z) - FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs [54.27040631527217]
We propose a novel framework called FoC to Figure out the Cryptographic functions in stripped binaries.
We first build a binary large language model (FoC-BinLLM) to summarize the semantics of cryptographic functions in natural language.
We then build a binary code similarity model (FoC-Sim) upon the FoC-BinLLM to create change-sensitive representations and use it to retrieve similar implementations of unknown cryptographic functions in a database.
arXiv Detail & Related papers (2024-03-27T09:45:33Z) - FastFlip: Compositional Error Injection Analysis [6.285347477114202]
We present FastFlip, a combination of empirical error injection and symbolic SDC propagation analyses.
FastFlip speeds up the analysis of incrementally modified programs by $3.2times$ (geomean)
arXiv Detail & Related papers (2024-03-20T21:42:21Z) - Mind the Error! Detection and Localization of Instruction Errors in Vision-and-Language Navigation [65.25839671641218]
We propose a novel benchmark dataset that introduces various types of instruction errors considering potential human causes.
We observe a noticeable performance drop (up to -25%) in Success Rate when evaluating the state-of-the-art VLN-CE methods on our benchmark.
We also propose an effective method, based on a cross-modal transformer architecture, that achieves the best performance in error detection and localization.
arXiv Detail & Related papers (2024-03-15T21:36:15Z) - Supporting Error Chains in Static Analysis for Precise Evaluation
Results and Enhanced Usability [2.8557828838739527]
Static analyses tend to report where a vulnerability manifests rather than the fix location.
This can cause presumed false positives or imprecise results.
We designed an adaption of an existing static analysis algorithm that can distinguish between a manifestation and fix location.
arXiv Detail & Related papers (2024-03-12T16:46:29Z) - E&V: Prompting Large Language Models to Perform Static Analysis by
Pseudo-code Execution and Verification [7.745665775992235]
Large Language Models (LLMs) offer new capabilities for software engineering tasks.
LLMs simulate the execution of pseudo-code, effectively conducting static analysis encoded in the pseudo-code with minimal human effort.
E&V includes a verification process for pseudo-code execution without needing an external oracle.
arXiv Detail & Related papers (2023-12-13T19:31:00Z) - Exploring Error Bits for Memory Failure Prediction: An In-Depth
Correlative Study [5.292618442300404]
We present a comprehensive study on the correlation between CEs and UEs.
Our analysis reveals a strong correlation between large-temporal error bits and UE occurrence.
Our approach effectively reduces the number of virtual machine interruptions caused by UEs by approximately 59%.
arXiv Detail & Related papers (2023-12-05T16:11:52Z) - Uncertainty-Aware AB3DMOT by Variational 3D Object Detection [74.8441634948334]
Uncertainty estimation is an effective tool to provide statistically accurate predictions.
In this paper, we propose a Variational Neural Network-based TANet 3D object detector to generate 3D object detections with uncertainty.
arXiv Detail & Related papers (2023-02-12T14:30:03Z) - Fast and Accurate Error Simulation for CNNs against Soft Errors [64.54260986994163]
We present a framework for the reliability analysis of Conal Neural Networks (CNNs) via an error simulation engine.
These error models are defined based on the corruption patterns of the output of the CNN operators induced by faults.
We show that our methodology achieves about 99% accuracy of the fault effects w.r.t. SASSIFI, and a speedup ranging from 44x up to 63x w.r.t.FI, that only implements a limited set of error models.
arXiv Detail & Related papers (2022-06-04T19:45:02Z) - VELVET: a noVel Ensemble Learning approach to automatically locate
VulnErable sTatements [62.93814803258067]
This paper presents VELVET, a novel ensemble learning approach to locate vulnerable statements in source code.
Our model combines graph-based and sequence-based neural networks to successfully capture the local and global context of a program graph.
VELVET achieves 99.6% and 43.6% top-1 accuracy over synthetic data and real-world data, respectively.
arXiv Detail & Related papers (2021-12-20T22:45:27Z) - Learning Robust Output Control Barrier Functions from Safe Expert Demonstrations [50.37808220291108]
This paper addresses learning safe output feedback control laws from partial observations of expert demonstrations.
We first propose robust output control barrier functions (ROCBFs) as a means to guarantee safety.
We then formulate an optimization problem to learn ROCBFs from expert demonstrations that exhibit safe system behavior.
arXiv Detail & Related papers (2021-11-18T23:21:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.