Latch susceptibility to transient faults and new hardening approach

Martin Omaña, Daniele Rossi, Cecilia Metra

    Research output: Contribution to journalArticlepeer-review

    108 Citations (Scopus)


    In this paper, we analyze the conditions making transient faults (TFs) affecting the nodes of conventional latch structures generate output soft errors (SEs). We investigate the susceptibility to TFs of all latch nodes and identify the most critical one(s). We show that, for standard latches using back-to-back inverters for their positive feedback, the internal nodes within their feedback path are the most critical. Such nodes will be hereafter referred to as internal feedback nodes. Based on this analysis, we first propose a low-cost hardened latch that, compared to alternative hardened solutions, is able to completely filter out TFs affecting its internal feedback nodes while presenting a lower susceptibility to TFs on the other internal nodes. This is achieved at the cost of a reduced robustness to TFs affecting the output node. To overcome this possible limitation (especially for systems for high-reliability applications), we propose another version of our latch that, at the cost of a small area and power consumption increase compared to our first solution, also improves the robustness of the output node, which can be higher than that of alternative hardened solutions. Additionally, both proposed latches present a comparable or higher robustness of the input node than alternative solutions and provide a lower or comparable power-delay product and area overhead than classical implementations and alternative hardened solutions.

    Original languageEnglish
    Pages (from-to)1255-1268
    Number of pages14
    JournalIEEE Transactions on Computers
    Issue number9
    Publication statusPublished - Sept 2007


    • Hardened latch
    • Robust design
    • Soft errors
    • Static latch
    • Transient faults


    Dive into the research topics of 'Latch susceptibility to transient faults and new hardening approach'. Together they form a unique fingerprint.

    Cite this