International Test Conference, 2003. Proceedings. ITC 2003.
DOI: 10.1109/test.2003.1270912
|View full text |Cite
|
Sign up to set email alerts
|

Data criticality estimation in software applications

Abstract: In safety-critical applications it is often possible to exploit software techniques to increase system's faulttolerance. Common approaches are based on data redundancy to prevent data corruption during the software execution. Duplicating most critical variables only can significantly reduce the memo ry and performance overheads, while still guaranteeing very good results in terms of fault-tolerance improvement. This paper presents a new methodology to compute the criticality of variables in target software app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…We split the non-SESE regions (with multiple entry and/or exit points) into two or three regions such that a new SESE region is created with as many static instructions as possible (and with many potential error sites) in it. For a basic block with multiple entry edges, 3 we split it into two blocks such that the first one with multiple entry edges has as few instructions as possible and the second block has a single entry edge. If the original block had only one exit edge, then the new second block becomes a new SESE region providing error sites in it with extra opportunity to compare state.…”
Section: When To Compare Executions?mentioning
confidence: 99%
See 1 more Smart Citation
“…We split the non-SESE regions (with multiple entry and/or exit points) into two or three regions such that a new SESE region is created with as many static instructions as possible (and with many potential error sites) in it. For a basic block with multiple entry edges, 3 we split it into two blocks such that the first one with multiple entry edges has as few instructions as possible and the second block has a single entry edge. If the original block had only one exit edge, then the new second block becomes a new SESE region providing error sites in it with extra opportunity to compare state.…”
Section: When To Compare Executions?mentioning
confidence: 99%
“…(2) Program analysis: Some evaluation techniques examine certain (static or dynamic) program properties to identify program locations that are susceptible to producing SDCs [9,20,3,25]. These techniques are much faster than error injection based techniques (running time average of approximately 5 CPU hours for the techniques and applications we study), but their accuracy in finding SDC-causing error sites has previously been hard to validate.…”
Section: Introductionmentioning
confidence: 99%
“…Benso et al [15], therefore, proposed a solution that performs run-time analysis of the application variables to obtain the criticality behavior of every variable. It first develops an analytical model to compute the criticality of a variable.…”
Section: Related Workmentioning
confidence: 99%
“…Technology can be hardened [2][3][4][5][6][7][8], hardware architectures may include redundancy [9][10][11][12][13][14][15][16][17][18][19], and finally all software layers may implement error detection and recovery mechanisms [20][21][22][23][24][25][26]. On the one hand, this enables designers to apply cross-layer holistic design approaches to manage errors in their systems.…”
Section: Introductionmentioning
confidence: 99%