Conference Paper

An approach for analysing the propagation of data errors in software

Dept. of Comput. Eng., Chalmers Univ. of Technol., Goteborg, Sweden;
DOI: 10.1109/DSN.2001.941402 Conference: Dependable Systems and Networks, 2001. DSN 2001. International Conference on
Source: CiteSeer

ABSTRACT We present a novel approach for analysing the propagation of data errors in software. The concept of error permeability is introduced as a basic measure upon which we define a set of related measures. These measures guide us in the process of analysing the vulnerability of software to find the modules that are most likely exposed to propagating errors. Based on the analysis performed with error permeability and its related measures, we describe how to select suitable locations for error detection mechanisms (EDMs) and error recovery mechanisms (ERMs). A method for experimental estimation of error permeability, based on fault injection, is described and the software of a real embedded control system analysed to show the type of results obtainable by the analysis framework. The results show that the developed framework is very useful for analysing error propagation and software vulnerability and for deciding where to place EDMs and ERMs.

0 Bookmarks
 · 
52 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Designing a dependable system successfully is a challenging issue that is an ongoing research subject in the literature. Different approaches have been adopted to analyse and verify the dependability of a system design. This process is far from obvious and often hampered due to the limitations of the classical dependability analysis and verification approaches. This paper provides an overview of model-based dependability analysis, design and verification approaches. Firstly, model-based analysis approaches are grouped by the limitations of the classical approaches. Secondly, design approaches have been classified looking at their underlying recovery strategies: hardware replication and hardware reuse. Then, the ins and outs of model-based verification approaches are identified starting from fault injection approaches towards their evolution into model-based integrative approaches. Finally, a model-based hybrid design process is presented making use of the reviewed analysis, design and verification approaches.
    International Journal On Advances in Security. 07/2013; 6(1 and 2):12-31.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Component Based Software systems (CBSSs) are being widely used because of their various advantages. Reliability of these systems is an important issue to be focused. The approaches which have been proposed so far, does not consider that the failure of one component depend on another and also assume that each failure affects equally to the overall system while practically it is not so. The failure of one component depends on other and also each kind of failure have their different impacts on overall system. This paper presents a new and enhanced approach for Reliability analysis of CBSSs, that will give more accurate reliability prediction than the approaches being proposed so far by taking into account the facts that the component failure affects other components as well and also that the different failure have their different impact on overall system.
    Computer and Communication Technology (ICCCT), 2012 Third International Conference on; 01/2012
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Designing a dependable system successfully is a challenging issue that is an ongoing research subject in the literature. Different approaches have been adopted in order to identify, analyse and verify the dependability of a system design. This process is far from obvious and often hampered due to the limitations of the classical dependability analysis techniques and verification approaches. This paper provides an overview of analysis approaches grouped by limitations. The principal points for the characterization of the considered approaches are the capability to handle notions of time, component-wise failure propagations and the use of architectural languages with the aim to extract analysis models from design models. Finally, verification approaches are partially reviewed.
    DEPEND 2012; 08/2012

Full-text (3 Sources)

View
20 Downloads
Available from
May 27, 2014