2000
DOI: 10.1109/23.903758
|View full text |Cite
|
Sign up to set email alerts
|

Experimentally evaluating an automatic approach for generating safety-critical software with respect to transient errors

Abstract: : This paper deals with a software modification strategy allowing on-line detection of transient errors. Being based on a set of rules for introducing redundancy in the high-level code, the method can be completely automated, and is therefore particularly suited for low-cost safety-critical microprocessor-based applications. Experimental results are presented and discussed, demonstrating the effectiveness of the approach in terms of fault detection capabilities. .

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0
1

Year Published

2010
2010
2013
2013

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 91 publications
(38 citation statements)
references
References 10 publications
0
37
0
1
Order By: Relevance
“…On the other hand, data-flow checking techniques rely on redundant computation by replicating instructions. This section describes the technique based on the introduction of additional executable assertions to check the correct execution of the program control flow [11] and the technique based on a set of rules for introducing redundancy in the high-level code for detecting transient error affected data [8].…”
Section: Softwarementioning
confidence: 99%
See 3 more Smart Citations
“…On the other hand, data-flow checking techniques rely on redundant computation by replicating instructions. This section describes the technique based on the introduction of additional executable assertions to check the correct execution of the program control flow [11] and the technique based on a set of rules for introducing redundancy in the high-level code for detecting transient error affected data [8].…”
Section: Softwarementioning
confidence: 99%
“…In literature [8], the author proposed a method which performs control flow and data detection by redundancy. Its basic ideas behind a set of transformation rules to get data and code redundancy is as following:…”
Section: Softwarementioning
confidence: 99%
See 2 more Smart Citations
“…It is able to detect a wide range of faults, and is not limited to a specific fault model (e.g., faults in the data, or faults affecting the control flow, only); therefore, it concurrently deals with faults affecting the data as well as the program flow. For example, faults induced in the system by highly energized particles such as the one produced by radioactive sources [13]. The results we gathered to analyze the method effectiveness show that programs hardened according to our rules attain high fault coverage figures, at a cost of an increase in the code size and a slow-down in the performance.…”
Section: Contribution Of the Papermentioning
confidence: 89%