A Fault Injection Approach to Evaluate Soft-Error Dependability of System Calls. Amarnath, R., Bhat, S. N., Munk, P., & Thaden, E. In 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pages 71–76, 2018. IEEE. bibtex @InProceedings{amarnath18fault,
author = {Amarnath, Rakshith and Bhat, Shashank Nagesh and Munk, Peter and Thaden, Eike},
title = {A Fault Injection Approach to Evaluate Soft-Error Dependability of System Calls},
booktitle = {2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)},
year = {2018},
pages = {71--76},
organization = {IEEE},
comment = {* automotive context, specifically with regard to new POSIX-based AUTOSAR
standard
* motivation: dependability for critical systems using COTS-grade hardware
* QEMU-based fault injection framework
* i.e., hook into QEMU: after decoding guest instructions
* bit flips in x86 registers (use Intel i5 for experiments)
* during the execution Linux (4.10) system calls
* classify effects on application level
* classes
* benign
* detected and corrected
* silent data corruption
* timeout
* application crash
* kernel crash
* system crash
* QEMU crash
* classes with respect to
* system call
* register injected in
* results can guide software-implemented hardware fault-tolerance (SIHFT)
measures},
file = {:amarnath18fault - A Fault Injection Approach to Evaluate Soft-Error Dependability of System Calls.pdf:PDF},
groups = {fault injection},
timestamp = {2019-02-22},
}
Downloads: 0
{"_id":"xHCmaKo2mCYCgaaje","bibbaseid":"amarnath-bhat-munk-thaden-afaultinjectionapproachtoevaluatesofterrordependabilityofsystemcalls-2018","author_short":["Amarnath, R.","Bhat, S. N.","Munk, P.","Thaden, E."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Amarnath"],"firstnames":["Rakshith"],"suffixes":[]},{"propositions":[],"lastnames":["Bhat"],"firstnames":["Shashank","Nagesh"],"suffixes":[]},{"propositions":[],"lastnames":["Munk"],"firstnames":["Peter"],"suffixes":[]},{"propositions":[],"lastnames":["Thaden"],"firstnames":["Eike"],"suffixes":[]}],"title":"A Fault Injection Approach to Evaluate Soft-Error Dependability of System Calls","booktitle":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","year":"2018","pages":"71–76","organization":"IEEE","comment":"* automotive context, specifically with regard to new POSIX-based AUTOSAR standard * motivation: dependability for critical systems using COTS-grade hardware * QEMU-based fault injection framework * i.e., hook into QEMU: after decoding guest instructions * bit flips in x86 registers (use Intel i5 for experiments) * during the execution Linux (4.10) system calls * classify effects on application level * classes * benign * detected and corrected * silent data corruption * timeout * application crash * kernel crash * system crash * QEMU crash * classes with respect to * system call * register injected in * results can guide software-implemented hardware fault-tolerance (SIHFT) measures","file":":amarnath18fault - A Fault Injection Approach to Evaluate Soft-Error Dependability of System Calls.pdf:PDF","groups":"fault injection","timestamp":"2019-02-22","bibtex":"@InProceedings{amarnath18fault,\n author = {Amarnath, Rakshith and Bhat, Shashank Nagesh and Munk, Peter and Thaden, Eike},\n title = {A Fault Injection Approach to Evaluate Soft-Error Dependability of System Calls},\n booktitle = {2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)},\n year = {2018},\n pages = {71--76},\n organization = {IEEE},\n comment = {* automotive context, specifically with regard to new POSIX-based AUTOSAR\n standard\n* motivation: dependability for critical systems using COTS-grade hardware\n* QEMU-based fault injection framework\n * i.e., hook into QEMU: after decoding guest instructions\n * bit flips in x86 registers (use Intel i5 for experiments)\n * during the execution Linux (4.10) system calls\n * classify effects on application level\n * classes\n * benign\n * detected and corrected\n * silent data corruption\n * timeout\n * application crash\n * kernel crash\n * system crash\n * QEMU crash\n * classes with respect to\n * system call\n * register injected in\n* results can guide software-implemented hardware fault-tolerance (SIHFT)\n measures},\n file = {:amarnath18fault - A Fault Injection Approach to Evaluate Soft-Error Dependability of System Calls.pdf:PDF},\n groups = {fault injection},\n timestamp = {2019-02-22},\n}\n\n","author_short":["Amarnath, R.","Bhat, S. N.","Munk, P.","Thaden, E."],"key":"amarnath18fault","id":"amarnath18fault","bibbaseid":"amarnath-bhat-munk-thaden-afaultinjectionapproachtoevaluatesofterrordependabilityofsystemcalls-2018","role":"author","urls":{},"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/AsPiHTmHHGjgy6xSQ","dataSources":["wjZw5s4JL49uLwn3p"],"keywords":[],"search_terms":["fault","injection","approach","evaluate","soft","error","dependability","system","calls","amarnath","bhat","munk","thaden"],"title":"A Fault Injection Approach to Evaluate Soft-Error Dependability of System Calls","year":2018}