The present disclosure relates to radiation hardening of microprocessors.
System uptime is increasingly limited by integrated circuit reliability, and modern systems have very high processing requirements. Thus a solution should have maximum performance; that is, essentially no delay increase is allowed, which precludes simple solutions such as temporal hardening techniques. Also, aerospace systems have limited power envelopes because of limited ability to remove heat in vacuum, for example. Finally, the area and power overhead allowed for hardening varies by market.
IBM servers have large (but diminishing) hardening costs. IBM servers, like the HERMES processor, use dual modular redundant register files. Additionally, on IBM servers, all registers are checkpointed on the processor. These designs also use full memory error-correcting code protection and redundant execution units. These designs generally do not fall into the appropriate thermal envelope (they are liquid cooled).
Core boundary checking is conventionally used. For example, duplicate cores or entire boards are checked and voted with an application-specific integrated circuit. However, this approach is not comprehensive; moreover, it is very difficult to resynchronize the cores after an error—the standard scenario is to reset the entire system in a controlled manner.
NASA/JPL refers to soft portions of present hardened central processing units as “glass jaws.” Some examples follow:
As such, there is a need for improved radiation hardened microprocessors.
Systems and methods for multi-mode radiation hardened multi-core microprocessors are disclosed. In some embodiments, a triplicated circuit includes a first core logic, a second core logic, a third core logic, and bus arbitration and control circuitry. The triplicated circuit is configurable to operate in both a Triple-Modular Redundant (TMR) mode of operation and a multi-threaded mode of operation. In some embodiments, there is essentially no overhead in soft mode and low overhead (power only) in hard mode. In most applications, it is expected that portions of missions require very hard systems (e.g., landing) where a failure is catastrophic. However, other portions require essentially no hardening (digital signal processor and signal processing activities) but much better throughput. Consequently, there is a huge opportunity to develop computer processors with low overhead in soft mode and unprecedented hardness in hard mode.
Hardness requirements depend on mission. The cores can be configured hard or soft in a mix/match manner. Thus, the same hardware can support different missions, and mission requirements can vary with time. For example, in a spacecraft, consider signal processing during transit and lander control at descent. The former has minimal hardening requirements—a simple retransmit can fix errors. In the latter case, a soft error may destabilize the craft or otherwise cause it to crash.
In some embodiments, the first core logic, the second core logic, and the third core logic are programmable by software. In some embodiments, the first core logic, the second core logic, and the third core logic implement a Central Processing Unit (CPU) or a Digital Signal Processer (DSP).
In some embodiments, the triplicated circuit also includes a first memory associated with the first core logic, a second memory associated with the second core logic, and a third memory associated with the third core logic. The first memory, the second memory, and the third memory are connected via self-correcting flip-flops when the triplicated circuit is configured to operate in the TMR mode. In some embodiments, the self-correcting flip-flops of the first memory, the second memory, and the third memory cause the first memory, the second memory, and the third memory to have the same value even if one was originally different.
In some embodiments, the triplicated circuit also includes a first cache associated with the first core logic, a second cache associated with the second core logic, and a third cache associated with the third core logic. A cache write by the first core logic, the second core logic, and the third core logic are passed through a majority gate such that the first cache, the second cache, and the third cache receive the same value during the cache write when the triplicated circuit is configured to operate in the TMR mode of operation.
In some embodiments, the bus arbitration and control circuitry is configured to combine the values from the first core logic, the second core logic, and the third core logic and automatically correct any mismatch, appearing as one core on the bus when the triplicated circuit is configured to operate in the TMR mode of operation.
In some embodiments, the bus arbitration and control circuitry is configured to arbitrate the values from the first core logic, the second core logic, and the third core logic, appearing as three cores on the bus when the triplicated circuit is configured to operate in the multi-threaded mode of operation.
In some embodiments, the triplicated circuit is implemented in a Field Programmable Gate Array (FPGA).
In some embodiments, a method of operating a triplicated circuit including a first core logic, a second core logic, a third core logic, and bus arbitration and control circuitry includes determining to operate in either a TMR mode of operation or a multi-threaded mode of operation.
In some embodiments, the triplicated circuit also includes a first memory associated with the first core logic, a second memory associated with the second core logic, and a third memory associated with the third core logic. The method also includes triplicating the first memory, the second memory, and the third memory via self-correcting flip-flops when the triplicated circuit is configured to operate in the TMR mode.
In some embodiments, triplicating the first memory, the second memory, and the third memory includes the self-correcting flip-flops of the first memory, the second memory, and the third memory causing the first memory, the second memory, and the third memory to have the same value even if one was originally different.
In some embodiments, the triplicated circuit also includes a first cache associated with the first core logic, a second cache associated with the second core logic, and a third cache associated with the third core logic. The method also includes passing a cache write by the first core logic, the second core logic, and the third core logic through a majority gate such that the first cache, the second cache, and the third cache receive the same value during the cache write when the triplicated circuit is configured to operate in the TMR mode of operation.
In some embodiments, the method also includes combining, by the bus arbitration and control circuitry, values from the first core logic, the second core logic, and the third core logic and automatically correcting any mismatch, appearing as one core on the bus when the triplicated circuit is configured to operate in the TMR mode of operation.
In some embodiments, the method also includes arbitrating, by the bus arbitration and control circuitry, values from the first core logic, the second core logic, and the third core logic, appearing as three cores on the bus when the triplicated circuit is configured to operate in the multi-threaded mode of operation.
In some embodiments, the method also includes reading the values of the first cache, the second cache, and the third cache and writing the values back to the first cache, the second cache, and the third cache to ensure the first cache, the second cache, and the third cache contain the same value.
In some embodiments, the triplicated circuit is implemented in a FPGA. In some embodiments, the method also includes generating a first error signal when one stored value of the first core logic, the second core logic, and the third core logic mismatches. In some embodiments, the method also includes generating a second error signal when one of the first core logic, the second core logic, and the third core logic mismatches a number of times exceeding a threshold.
In some embodiments, the method also includes, in response to generating the second error signal, generating a FPGA configuration scrub for the core logic indicated by the second error signal.
Those skilled in the art will appreciate the scope of the present disclosure and realize additional aspects thereof after reading the following detailed description of the preferred embodiments in association with the accompanying drawing figures.
The accompanying drawing figures incorporated in and forming a part of this specification illustrate several aspects of the disclosure, and together with the description serve to explain the principles of the disclosure.
The embodiments set forth below represent the necessary information to enable those skilled in the art to practice the embodiments and illustrate the best mode of practicing the embodiments. Upon reading the following description in light of the accompanying drawing figures, those skilled in the art will understand the concepts of the disclosure and will recognize applications of these concepts not particularly addressed herein. It should be understood that these concepts and applications fall within the scope of the disclosure and the accompanying claims.
The present disclosure relates to an approach to triplicate the processor cores into triplets, that is, groups of three processors. Each triplet is constructed as one unit. The cores run independently (separate software threads) in an unhardened operational mode for maximum performance. The hardware is Triple-Modular Redundant (TMR), that is, self-correcting, in hardened mode. The hardware has one third the throughput but is hardened against radiation-induced soft-errors with vanishing error rates. This allows mission-specific (or mission portion-specific) hardening with the same hardware having minimal compromise in performance in unhardened mode.
Systems and methods for multi-mode radiation hardened multi-core microprocessors are disclosed. In some embodiments, a triplicated circuit includes a first core logic, a second core logic, a third core logic, and bus arbitration and control circuitry. The triplicated circuit is configurable to operate in both a TMR mode of operation and a multi-threaded mode of operation. In some embodiments, there is essentially no overhead in soft mode and low overhead (power only) in hard mode. In most applications, it is expected that portions of missions require very hard systems (e.g., landing) where a failure is catastrophic. However, other portions require essentially no hardening (digital signal processor and signal processing activities) but much better throughput. Consequently, there is a huge opportunity to develop computer processors with low overhead in soft mode and unprecedented hardness in hard mode.
Hardness requirements depend on mission. The cores can be configured to be hard or soft in a mix/match manner. Thus, the same hardware can support different missions, and mission requirements can vary with time. For example, in a spacecraft, consider signal processing during transit and lander control at descent. The former has minimal hardening requirements—a simple retransmit can fix errors. In the latter case, a soft error may destabilize the craft or otherwise cause it to crash.
The key to rapidly hardening commercially available Intellectual Property (IP) is to be able to produce a Register Transfer Language (RTL) version of said IP that is hardened but also is provably identical in function to the original, at least in the unhardened mode of operation. Since formal logic equivalency checking methods work by comparing OBBs of logic between sequential elements, the subsequent methods of the present disclosure are provably strictly correct.
In a 12-core example, shown in
There are no core logic changes, just self-correcting TMR sequential circuit insertion and triplication of the RTL modules, as described subsequently. Any synthesized logic is triplicated, and soft errors are repaired by the automatic repair in the TMR self-correcting Flip-Flops (FFs) in the hardened mode. The bus interface is external. It must be TMR or be arbitrated in a separate thread (unhardened) mode. This is the point at which there may be need for manual changes and validation effort.
As shown in
As shown in
There are options for data from the caches (vote or not). In
As shown in
Since the cache data are replicated, they can simply be voted out by reading and writing each cache location with the same data. The corrected data are automatically written back to all caches. This requires software only, which is a big advantage. The software does not need any awareness of the mechanisms or special control constructs.
This method of reading and writing every location can be performed using cache lookups, but this does not fix errors that may occur in the tags. In some embodiments, special cache instructions, which exist on all processors, can be used to read and write every cache location. The same mechanisms can be used to vote and repair Translation Lookaside Buffer (TLB) data and other arrayed structures. TLB data are basically page address caches.
Method to Automatically Triplicate the Standard IP RTL
Related art provides multiple node charge collection protection for TMR logic by placing the logic belonging to different TMR domains in distinct regions with minimized interaction between the regions. It is well known that this is essential to avoiding a single radiation particle from upsetting circuits in two domains and thus thwarting TMR.
As discussed above, the key to rapidly hardening commercially available IP is to be able to produce an RTL version of said IP that is hardened but also is provably identical in function to the original, at least in the unhardened mode of operation. Since formal logic equivalency checking methods work by comparing OBBs of logic between sequential elements, the subsequent methods of the present disclosure are provably strictly correct. The related art operated on the initial IP (
A semiconductor IP core, or IP block, is a reusable unit of logic layout design. IP cores may be licensed or purchased and used by another. IP cores are sometimes acquired as synthesizable RTL or in a hardware description language such as Verilog or Very High Speed Integrated Circuit (VHSIC) hardware description language. IP cores delivered as RTL enable designers to modify designs at the functional level. IP cores are also sometimes available as gate-level netlists. The netlist is a Boolean algebra representation of the logical function of the IP implemented as generic gates.
The related-art method to triplicate the block works on a gate-by-gate basis, triplicating the logic to provide an A, a B, and a C copy of each combinational logic cell. Since in the integrated clock gater, the latches are integral, these are triplicated but not self-correcting. In this case, the input to the latch is updated every cycle, and the layout provides sufficient separation so that no two latches are likely to be simultaneously upset by a single impinging radiation particle. Thus, self-correction would not be beneficial. The FF sequential elements in
In the related-art method, each gate, latch, and FF is assigned to an A region, a B region, a C region, or TRSCFF core site, respectively, on an individual basis. This is easily done by name since the triplicating programs provide correct names when triplicating the elements, as is evident in
In the improvement method of the present disclosure, the triplication programs assign all gates and other latches internal to the combinational logic blocks to hierarchical combinational blocks. This allows the hierarchical blocks to be assigned en masse to the appropriate A, B, and C regions. The commercially available APR tools thus recognize that when buffering a signal or making any other logic modification during placement, routing, and timing optimization that the new gate should be assigned to the same region as the block to which it belongs. The resulting block diagram shown in
The pseudo code that follows provides the algorithm for splitting the non-redundant IP (as Verilog) into the form of triplicated Verilog (as multiple files). Those skilled in the art will understand that the order of the operations may be changed and specific approaches may be altered without changing the key aspects of the present disclosure. All such operational changes and alterations are considered within the scope of the present disclosure. The algorithm produces a top-level Verilog that contains the self-correcting TMR SEs and the top-level signals. A separate file is produced for each of the A, B, and C hierarchical submodules produced.
The input is a gate-level synthesized netlist, so synthesis must be run on the non-TMR RTL first. The program then reads the resulting RTL and creates the top-level RTL module and each sub-module. The top level instantiates the triplicated top-level signals and Self-Correcting TMR (SCTMR) FFs, or SCTMR latches as needed.
Wires that are primary inputs to FFs and Combinational Logic (CL) blocks or are only inputs to the CL blocks are added as pins on the appropriate triplicated CL block. Similarly, wires that are inputs to the SCTMRFFs are added as outputs on the appropriate (A, B, or C) CL block. To simplify the process, any self-correcting sequential D or CLK input is added to the appropriate CL block output list, and any self-correcting sequential Q output is added as an input to the CL block input list. In some embodiments, a check is made later to determine if one of these signals is a top-level module primary input or output. If so, it is retained on the input or output list of the CL block only if it is also on the usedlist, since the usedlist signifies that signal is used by a gate in the CL. It should be obvious to those skilled in the art that this ordering of operations may be altered. However, this ordering was chosen so that all gate declarations would be read and triplicated, thereby putting its signals on the appropriate usedlist, before cleaning the CL block interface of top-level pins driving sequential circuits directly.
Buses are handled by treating their individual signals until the end, where wire and pin declarations are compressed into the appropriate buses. To accomplish this, bus declarations are added to a bus list. In this manner, buses can be treated as individual wires in the netlist triplication process, but as single declarations at the module level.
Any signal that is neither a top-level pin nor a TMR FF input or output, is by definition a local signal in the TMR blocks. Adding these to a list, that is, the usedlist shown in the pseudocode, for each CL block after triplication allows these declarations to be saved and later output to the appropriate netlist. Pseudo-code 1 is as follows:
Implementation in a Field-Programmable Gate Array (FPGA) Instead of an Application-Specific Integrated Circuit (ASIC)
FPGAs are increasingly useful for radiation hardened circuits because of the relatively low cost of programming them to specific functions. TMR is commonly used but is handicapped by the lack of existing TMR IP. The methods of the present disclosure may be used to provide TMR microprocessor and other commercial IP functionality in a hardened circuit. The TRSCFFs must be implemented using multiple FPGA lookup tables and FFs. One such approach is shown in
FPGAs have poor clock skew if the clocks are TMR clocks, so a single clock is used for the SCTMR circuit. The input majority gates M connected to DA, DB, and DC are optional. In this circuit, any cycle that does not load the FFs 12 is a correction cycle where the TMR voted value is loaded into all three FFs 12. Thus, the normal Clock Enable (CE) of the FPGA FFs 12 is always asserted to clock the FFs 12. To load the FFs 12 on a TMR clock enable assertion, the multiplexer 10 selects CEA, CEB, and CEC as determined by each TMR CL driving the multiplexer 10 choosing between the input and the voted feedback is used. Thus, each FF 12 is corrected on any cycle that does not load it with new data.
Static random-access memory-based FPGAs have the most likelihood of soft-error upset in their configuration memory because of the large number (over fifty million) of bits in large FPGAs. Such a configuration memory upset can cause one of the TMR circuits to take on a new erroneous circuit configuration, causing a persistent error rather than a transient error that a soft-error in the TMR circuits would cause.
The error signal is helpful, since it can be aggregated from all the SCTMR circuits to provide an indication that a configuration static random-access memory upset has occurred. As shown, Error1 is the output of Exclusive OR (XOR) gate 20 which detects any discrepancy in the three values. Error2 is similarly the output of XOR 22 which checks for a discrepancy for the data coming out of the core logic. Since it can be assumed that the data going into the core logics has been checked, Error2 is most likely to detect a configuration error because it monitors the CL driving the element.
Any multiplicity of such error indications or Error1 being on after a correction cycle is an indicator that the circuit function has changed to produce an erroneous signal in one of the TMR domains. If this occurs, the appropriate response is to signal a configuration memory scrub or renewal cycle to remove the error before continuing operation. This may occur on only one CPU triplet in some FPGAs so that useful work may continue in the others while the scrub operation occurs.
Thus, upon detection of any, or at least a persistent error signal, the CPU should halt and trigger a FPGA configuration memory scrub (local or global) to ensure that the error, if caused by a configuration soft-error, is mitigated. The actual scrub type and mechanism can vary and may be internal or external to the FPGA.
When the triplicated circuit shown in
The present disclosure includes, but is not limited to, the following:
The following acronyms are used throughout this disclosure.
Those skilled in the art will recognize improvements and modifications to the preferred embodiments of the present disclosure. All such improvements and modifications are considered within the scope of the concepts disclosed herein and the claims that follow.
This application claims the benefit of provisional patent application Ser. No. 62/372,542, filed Aug. 9, 2016, the disclosure of which is hereby incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4621201 | Amdahl et al. | Nov 1986 | A |
4897814 | Clark | Jan 1990 | A |
5883814 | Luk et al. | Mar 1999 | A |
6104211 | Alfke | Aug 2000 | A |
6127864 | Mavis et al. | Oct 2000 | A |
6499048 | Williams | Dec 2002 | B1 |
6526559 | Schiefele et al. | Feb 2003 | B2 |
6646464 | Maruyama | Nov 2003 | B2 |
6898770 | Boluki et al. | May 2005 | B2 |
7138442 | Smith et al. | Nov 2006 | B2 |
7212448 | Trimberger | May 2007 | B1 |
7310759 | Carmichael | Dec 2007 | B1 |
7321989 | Grayver | Jan 2008 | B2 |
7404161 | Dutt et al. | Jul 2008 | B2 |
7541832 | Clark et al. | Jun 2009 | B1 |
7649216 | Clark et al. | Jan 2010 | B1 |
7719304 | Clark et al. | May 2010 | B1 |
7859292 | Shuler, Jr. | Dec 2010 | B1 |
7904772 | Nicolaidis | Mar 2011 | B2 |
7920409 | Clark et al. | Apr 2011 | B1 |
7920410 | Lee et al. | Apr 2011 | B1 |
8015533 | Burstein et al. | Sep 2011 | B1 |
8122317 | Clark et al. | Feb 2012 | B1 |
8161367 | Chandra | Apr 2012 | B2 |
8397130 | Clark et al. | Mar 2013 | B2 |
8397133 | Clark et al. | Mar 2013 | B2 |
8462565 | Venugopal et al. | Jun 2013 | B2 |
8488370 | Venugopal et al. | Jul 2013 | B2 |
8489919 | Clark et al. | Jul 2013 | B2 |
8493120 | Choudhury et al. | Jul 2013 | B2 |
8495548 | Agarwal et al. | Jul 2013 | B2 |
8717793 | Maurya et al. | May 2014 | B2 |
8729923 | Ramachandra | May 2014 | B2 |
8767445 | Chellappa et al. | Jul 2014 | B2 |
8787086 | Clark et al. | Jul 2014 | B1 |
8791718 | Clark et al. | Jul 2014 | B2 |
8860197 | Clark et al. | Oct 2014 | B2 |
8860575 | Allee et al. | Oct 2014 | B2 |
8863064 | Tien et al. | Oct 2014 | B1 |
8966329 | Clark et al. | Feb 2015 | B2 |
9038012 | Clark et al. | May 2015 | B2 |
9041429 | Clark | May 2015 | B2 |
9054688 | Clark et al. | Jun 2015 | B2 |
9159421 | Maurya et al. | Oct 2015 | B2 |
9191009 | Clark et al. | Nov 2015 | B1 |
9467144 | Clark | Oct 2016 | B2 |
9734272 | Clark et al. | Aug 2017 | B2 |
9740494 | Clark et al. | Aug 2017 | B2 |
9780788 | Clark | Oct 2017 | B2 |
10078494 | Clark et al. | Sep 2018 | B2 |
20050246587 | Bernick | Nov 2005 | A1 |
20060050550 | Petersen | Mar 2006 | A1 |
20060150186 | Grayver | Jul 2006 | A1 |
20060220700 | Hoover et al. | Oct 2006 | A1 |
20070277137 | Savithri et al. | Nov 2007 | A1 |
20080082893 | Wang | Apr 2008 | A1 |
20090184733 | Lilja | Jul 2009 | A1 |
20090204933 | Rezgui | Aug 2009 | A1 |
20110208997 | Czajkowski | Aug 2011 | A1 |
20120180005 | Lilja | Jul 2012 | A1 |
20120306535 | Clark et al. | Dec 2012 | A1 |
20140049286 | Clark | Feb 2014 | A1 |
20140077854 | Clark et al. | Mar 2014 | A1 |
20140143635 | Gandhi | May 2014 | A1 |
20150081267 | Conroy | Mar 2015 | A1 |
20150363517 | Clark et al. | Dec 2015 | A1 |
20160065243 | Patterson et al. | Mar 2016 | A1 |
20170185465 | Ould-Ahmed-Vall | Jun 2017 | A1 |
Number | Date | Country |
---|---|---|
8912300 | Dec 1989 | WO |
2009085363 | Jul 2009 | WO |
2010011399 | Jan 2010 | WO |
2010042820 | Apr 2010 | WO |
2010042824 | Apr 2010 | WO |
2010104543 | Sep 2010 | WO |
2010138639 | Dec 2010 | WO |
2011022099 | Feb 2011 | WO |
2012012369 | Jan 2012 | WO |
Entry |
---|
Anelli, G. et al., “Radiation tolerant VLSI circuits in standard deep submicron CMOS technologies for the LHC experiments: practical design aspects,” IEEE Transactions on Nuclear Science, vol. 46, Issue 6, Dec. 1999, pp. 1690-1696. |
Author Unknown, “RTAX-S/SL and RTAX-DSP Radiation-Tolerant FPGAs,” Microsemi Corporation, Revision 15, May 2012, www.actel.com/documents/RTAXS_DS.pdf, 278 pages. |
Benedetto, J. et al., “Digital single event transient trends with technology node scaling,” IEEE Transactions on Nuclear Science, vol. 53, Issue 6, Dec. 2006, pp. 3462-3465. |
Benedetto, J. et al., “Heavy ion-induced digital single-event transients in deep submicron processes,” IEEE Transactions on Nuclear Science, vol. 51, Issue 6, Dec. 2004, pp. 3480-3485. |
Benini, L. et al., “A survey of design techniques for system-level dynamic power management,” IEEE Transactions on Very Large Scale Integration (VLSI) Syst., vol. 8, Issue 3, Jun. 2000, pp. 299-316. |
Biswas, Arijit, et al., “Computing Architectural Vulnerability Factors for Address-Based Structures,” 32nd International Symposium on Computer Architecture, Jun. 2005, IEEE, 12 pages. |
Braatz, James, et al., “ASIC Design System for Radiation Environments,” Fourth Annual IEEE International ASIC Conference and Exhibit, Sep. 23-27, 1991, Rochester, New York, IEEE, 4 pages. |
Cabanas-Holmen, Manuel, et al., “Predicting the Single-Event Error Rate of a Radiation Hardened by Design Microprocessor,” IEEE Transactions on Nuclear Science, vol. 58, Issue 6, Dec. 2011, IEEE, pp. 2726-2733. |
Calin, T., et al., “Upset Hardened Memory Design for Submicron Cmos Technology,” IEEE Transactions on Nuclear Science, vol. 43, No. 6, Dec. 1996, pp. 2874-2878. |
Chellappa, Srivatsan, et al., “Advanced Encryption System with Dynamic Pipeline Reconfiguration for Minimum Energy Operation,” 16th International Symposium on Quality Electronic Design, Mar. 2-4, 2015, Santa Clara, California, IEEE, pp. 201-206. |
Clark, Lawrence, et al., “A Dual Mode Redundant Approach for Microprocessor Soft Error Hardness,” IEEE Transactions on Nuclear Science, vol. 58, Issue 6, Dec. 2011, IEEE, pp. 3018-3025. |
Clark, Lawrence, et al., “An Embedded Microprocessor Radiation Hardened by Microarchitecture and Circuits,” IEEE Transactions on Computers, vol. 65, No. 2, Apr. 2015, IEEE Computer Society, 14 pages. |
Clark, Lawrence, et al., “Methodical Design Approaches to Radiation Effects Analysis and Mitigation in Flip-flop Circuits,” IEEE Computer Society Annual Symposium on VLSI, Jul. 9-11, 2014, Tampa, Florida, IEEE, pp. 595-600. |
Diehl, S.E. et al., “Considerations for single event immune VLSI logic,” IEEE Transactions Nuclear Science, vol. 30, Issue 6, 1983, pp. 4501-4507. |
Dodd, P. et al., “Production and propagation of single-event transients in high-speed digital logic ICs,” IEEE Transactions on Nuclear Science, vol. 51, Issue. 6, Dec. 2004, pp. 3278-3284. |
Drake, Alan J., et al., “A Self-Correcting Soft Error Tolerant Flop-Flop,” 12th NASA Symposium on VLSI Design, Oct. 4-5, 2005, 5 pages. |
Dumitru, Radu, et al.,“130nm Single Event Upset Performance Evaluation: Commercial vs. Hardened by Design Architectures,” IEEE Radiation Effects Data Workshop, Jul. 25-29, 2011, Las Vegas, Nevada, IEEE, 6 pages. |
Gadlage, M. et al., “Single event transient pulse widths in digital microcircuits,” IEEE Transactions on Nuclear Science, vol. 51, Issue. 6, Dec. 2004, pp. 3285-3290. |
Haddad, Nadim, et al., “Second Generation (200MHz) RAD750 Microprocessor Radiation Evaluation,” European Conference on Radiation and Its Effects on Components and Systems, Sep. 19-23, 2011, Sevilla, Spain, IEEE, pp. 877-880. |
Hansen, D. et al., “Clock, flip-flop, and combinatorial logic contributions to the SEU cross section in 90 nm ASIC technology,” IEEE Transactions on Nuclear Science, vol. 56, Issue 6, Dec. 2009, pp. 3542-3550. |
Hazucha, Peter, et al., “Measurements and Analysis of SER-Tolerant Latch in a 90-nm Dual-VT CMOS Process,” IEEE Journal of Solid-State Circuits, vol. 39, Issue 9, Sep. 2004, IEEE, pp. 1536-1543. |
Hindman, Nathan, et al., “Fully Automated, Testable Design of Fine-Grained Triple Mode Redundant Logic,” IEEE Transactions on Nuclear Science, vol. 58, Issue 6, Dec. 2011, IEEE, pp. 3046-3052. |
Hindman, Nathan, et al., “High Speed Redundant Self-correcting Circuits for Radiation Hardened by Design Logic,” European Conference on Radiation and Its Effects on Components and Systems, Sep. 14-18, 2009, Bruges, Belgium, IEEE, pp. 465-472. |
Hoang, T. et al., “A Radiation Hardened 16-Mb SRAM for Space Applications,” IEEE Aerospace Conference, Mar. 3-10, 2007, pp. 1-6. |
Knudsen, Jonathan E., et al., “An Area and Power Efficient Radiation Hardened by Design Flip-Flop,” IEEE Transactions on Nuclear Science, vol. 53, No. 6, Dec. 2006, pp. 3392-3399. |
Kobayashi, D. et al., “Analytical Expression for Temporal Width Characterization of Radiation-Induced Pulse Noises in SOI CMOS Logic Gates,” IEEE 47th International Reliability Physics Symposium (IRPS), Montreal, Canada, 2009, pp. 165-169. |
Lacoe, Ronald C., et al., “Application of Hardness-By-Design Methodology to Radiation-Tolerant ASIC Technologies,” IEEE Transactions on Nuclear Science, vol. 47, No. 6, Dec. 2000, pp. 2334-2341. |
Liden, Peter, et al., “On Latching Probability of Particle Induced Transients in Combinational Networks,” Twenty-Fourth International Symposium on Fault-Tolerant Computing, Jun. 15-17, 1994, Austin, Texas, IEEE, pp. 340-349. |
Matush, Bradley I., et al., “Area-Efficient Temporally Hardened by Design Flip-Flop Circuits,” IEEE Transactions on Nuclear Science, vol. 57, No. 6, Dec. 2010, pp. 3588-3595. |
Mavis, David G., et al., “Soft Error Rate Mitigation Techniques for Modern Microcircuits,” 40th Annual International Reliability Physics Symposium, Dallas, Texas, Copyright: 2002, pp. 216-225. |
Mitra, Subhasish, et al., “Logic Soft Errors in Sub-65nm Technologies Design and CAD Challenges,” Proceedings of the 42nd Design Automation Conference, Jun. 13-17, 2005, Anaheim, California, IEEE, 3 pages. |
Mitra, Subhasish, et al., “Robust System Design with Built-In Soft-Error Resilience,” Computer, vol. 38, Issue 2, Feb. 2005, IEEE Computer Society, pp. 43-52. |
Morgan, Keith S., et al., “A Comparison of TMR with Alternative Fault-Tolerant Design Techniques for FPGAs,” IEEE Transactions on Nuclear Science, vol. 54, No. 6, Dec. 2007, pp. 2065-2072. |
Nicklaw, Christopher, et al., “Hierarchical CAD Tools for Radiation Hardened Mixed Signal Electronic Circuits,” Technical Report A-2, Jan. 28, 2005, Silvaco Data Systems, Santa Clara, California, 37 pages. |
Quinn, Heather, et al., “A Review of Xilinx FPGA Architectural Reliability Concerns from Virtex to Virtex-5,” Radiation and Its Effects on Components and Systems (RADECS), Sep. 2007, 8 pages. |
Ricci, F. et al., “A 1.5 GHz 90 nm embedded microprocessor core,” 2005 Symposium on VLSI Circuits Digest of Technical Papers, 2005, pp. 12-15. |
Seifert, Norbert, et al., “Radiation-Induced Clock Jitter and Race,” 43rd Annual International Reliability Physics Symposium, San Jose, California, 2005, IEEE, pp. 215-222. |
Sexton, F.W. et al., “SEU simulation and testing of resistor-hardened D-latches in the SA3300 microprocessor,” IEEE Transactions on Nuclear Science, vol. 38, Issue 6, Dec. 1991, pp. 1521-1528. |
Shambhulingaiah, Sandeep et al., “Temporal Sequential Logic Hardening by Design with a Low Power Delay Element,” RADECS 2011 Proceedings, Copyright: 2011, pp. 144-149. |
Shuler, R. et al., “Comparison of dual-rail and TMR logic cost effectiveness and suitability for FPGAs with reconfigurable SEU tolerance,” IEEE Transactions on Nuclear Science, vol. 56, Issue 1, Feb. 2009, pp. 214-219. |
Sturesson, F., et al., “Radiation Characterization of a Dual Core LEON3-FT Processor,” European Conference on Radiation and Its Effects on Components and Systems, Sep. 19-23, 2011, Sevilla, Spain, IEEE, pp. 938-944. |
Tipton, A. D. et al., “Device-orientation effects on multiple-bit upset in 65 nm SRAMs,” IEEE Transactions on Nuclear Science, vol. 55, Issue 6, Dec. 2008, pp. 2880-2885. |
Turowski, M. et al., “Mixed-mode simulation and analysis of digital single event transients in fast CMOS ICs,” 14th International Conference on Mixed Design of Integrated Circuits and Systems, Jun. 21-23, 2007, pp. 433-438. |
Warren, K. et al., “Heavy ion testing and single event upset rate prediction considerations for a DICE flip-flop,” IEEE Transactions on Nuclear Science, vol. 56, Issue 6, Dec. 2009, pp. 3130-3137. |
Yao, Xiaoyin, et al., “A 90nm Bulk CMOS Radiation Hardened by Design Cache Memory,” European Conference on Radiation and Its Effects on Components and Systems, Sep. 14-18, 2009, Bruges, Belgium, IEEE, pp. 473-480. |
Author Unknown, “Announcing the Advanced Encryption Standard (AES),” Federal Information Processing Standards Publication 197, Nov. 26, 2001, National Institute of Standards and Technology, 51 pages. |
Katsarou, K., et al., “Soft error interception latch: double node charge sharing SEU tolerant design,” Electronics Letters, vol. 51, Issue 4, Feb. 2015, pp. 330-332. |
Mathew, J., et al., “On the Design of Different Concurrent EDC Schemes for S-Box and GF(p),” 11th International Symposium on Quality Electronic Design, Mar. 2010, pp. 211-218. |
Naseer, Riaz, et al., “DF-DICE: A Scalable Solution for Soft Error Tolerant Circuit Design,” International Symposium on Circuits and Systems, May 21-24, 2006, IEEE, pp. 3890-3893. |
Ramamurthy, Chandarasekaran, et al., “Physical Design Methodologies for Soft Error Mitigation Using Redundancy,” 15th European Conference on Radiation and Its Effects on Components and Systems, Sep. 14-18, 2015, IEEE, 5 pages. |
Intrinsic ID, “SRAM PUF: The secure silicon fingerprint”, Intrinsic-Id Inc. White Paper, Jun. 2016, 6 pages. |
Number | Date | Country | |
---|---|---|---|
20180046580 A1 | Feb 2018 | US |
Number | Date | Country | |
---|---|---|---|
62372542 | Aug 2016 | US |