![Lecture image placeholder](/_next/image?url=https%3A%2F%2Fassets.underline.io%2Flecture%2F96123%2Fposter%2Flarge-376c47c6f60003deaa154d0127caf3e5.png&w=3840&q=75)
Premium content
Access to this content requires a subscription. You must be a premium user to view this content.
Monthly subscription - $9.99Pay per view - $4.99Access through your institutionLogin with Underline account
Need help?
Contact us![Lecture placeholder background](/_next/image?url=https%3A%2F%2Fassets.underline.io%2Flecture%2F96123%2Fposter%2Flarge-376c47c6f60003deaa154d0127caf3e5.png&w=3840&q=75)
VIDEO DOI: https://doi.org/10.48448/p7rw-3e26
PAPER DOI: 10.1109/IRPS48228.2024.10529436
poster
Possible Origins, Identification, and Screening of Silent Data Corruption in Data Centers
Recent studies from Google and Facebook independently reported that in their large-scale server facilities, certain instructions were executed by specific CPU cores incorrectly. In a large server fleet, these errors often go undetected and hence are termed "silent". In this work, we investigate how individual defects within a device, when combined with background aging, can manifest as a critical fault in a logic path and potentially lead to corrupt execution errors in a multi-core system.