Proceedings Seventh International on-Line Testing Workshop
DOI: 10.1109/olt.2001.937809
|View full text |Cite
|
Sign up to set email alerts
|

Validation of a software dependability tool via fault injection experiments

Abstract: The present paper presents the validation of the strategies employed in the RECCO tool to analyze a C/C++ software; the RECCO compiler scans C/C++ source code to extract information about the significance of the variables that populate the program and the code structure itself. Experimental results gathered on an Open Source Router are used to compare and correlate two sets of critical variables, one obtained by fault injection experiments, and the other applying the RECCO tool, respectively. Then the two sets… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…SIHFT detects or tolerates faults in the hardware using software methods and without referring to any special hardware for error detection or fault tolerance. Several SIHFT techniques have been proposed in order to deal with different types of hardware errors such as Algorithm Based Fault Tolerance (ABFT) [5], Assertions, and Variable Duplication [6].…”
Section: B Software Fault Tolerancementioning
confidence: 99%
“…SIHFT detects or tolerates faults in the hardware using software methods and without referring to any special hardware for error detection or fault tolerance. Several SIHFT techniques have been proposed in order to deal with different types of hardware errors such as Algorithm Based Fault Tolerance (ABFT) [5], Assertions, and Variable Duplication [6].…”
Section: B Software Fault Tolerancementioning
confidence: 99%
“…The overall idea is that each output already includes the contribution of the corresponding operands that can therefore be excluded from the set of resources to consider (Algorithm 1, row [14][15][16]. If more than one output is computed based on the same set of operands, only one of these outputs must be considered (Algorithm 1, row [18][19][20][21][22][23][24][25]. Whenever a storage element is written, the operands used during the last instruction targeting the same resource must be considered again (Algorithm 1, row [14][15][16].…”
Section: Analytical Modelmentioning
confidence: 99%
“…To efficiently tradeoff between fault tolerance cost and system reliability one has to ask: what is the probability of a program P to have a correct execution state given a certain hardware (raw) soft-error rate? Fault injection is a viable solution to answer this question [18], [19], [20]. However, it can be very expensive and time consuming.…”
Section: Introductionmentioning
confidence: 99%
“…by a set of carefully chosen software error detection mechanisms [7]. These techniques include Algorithm Based Fault Tolerance (ABFT) [8], Assertions, and Variable Duplication [9][10][11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%