2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks 2015
DOI: 10.1109/dsn.2015.36
|View full text |Cite
|
Sign up to set email alerts
|

Fine-Grained Characterization of Faults Causing Long Latency Crashes in Programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
9
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 27 publications
1
9
0
Order By: Relevance
“…The instructions used to check a loop conditional increases the segmentation fault latency slightly before the induction variable is used as part of a load/store during the subsequent iteration. Segmentation fault latencies for these applications are consistent with those reported for the Linux kernel [20] and other benchmarks [30]. Figure 6 shows the bit locations that generated a segmentation fault.…”
Section: Micro-level Propagationsupporting
confidence: 81%
See 1 more Smart Citation
“…The instructions used to check a loop conditional increases the segmentation fault latency slightly before the induction variable is used as part of a load/store during the subsequent iteration. Segmentation fault latencies for these applications are consistent with those reported for the Linux kernel [20] and other benchmarks [30]. Figure 6 shows the bit locations that generated a segmentation fault.…”
Section: Micro-level Propagationsupporting
confidence: 81%
“…Prior work has explored how deviations from bit-flips in floatingpoint computation impact on convergence properties [16,17]. Other work has used corruption propagation in the development of lowlevel instruction based detection schemes that check invariants or create SDC detectors inside the compiler [23,38] or utilize code replication to detect corruption in instructions that are likely lead to and propagate corrupted state [18,27,28], and understanding long latency crashes [30,45]. This paper combines the latency of programmatic systems of corruption -e.g., segfaults, detection, control flow divergence, with corruption propagation in state variables to discuss the impact of detection latency on recovery options.…”
mentioning
confidence: 99%
“…Mutation testing has a long history in the context of fault injection tools [15]. Mutations typically target the source code, while other fault injection techniques target the compiler [16]. The developers of the Devil device driver interface definition language used mutations in the device driver interface to show that their language checker was able to detect erroneous specifications before they were deployed into an operating system kernel [17].…”
Section: Related Workmentioning
confidence: 99%
“…Relyzer [45] aims to evaluate the effectiveness of software symptom-based error detection techniques and to identify all the SDCs [46,47]. Relyzer injects faults only at the software level (architectural registers and output of load/store address generation units), without considering microarchitecture level masking and its features (flushes, store forwarding, dead instructions, cache write backs etc.)…”
Section: Related Workmentioning
confidence: 99%
“…Control-equivalence: Software analysis using basic blocks tracks the control flow paths of all the dynamic instances of all the static instructions to separate Masked from SDC faults [46]. For each path Relyzer randomly chooses only one pilot.…”
Section: Analysis Of Relyzer's Heuristicsmentioning
confidence: 99%