Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Fault Injection for Software Certification

Published: 01 July 2013 Publication History

Abstract

As software becomes more pervasive and complex, it's increasingly important to ensure that a system will be safe even in the presence of residual software faults (or bugs). Software fault injection consists of the deliberate introduction of software faults for assessing the impact of faulty software on a system and improving its fault tolerance. SFI has been included as a recommended practice in recent safety standards and has therefore gained interest among practitioners, but it's still unclear how it can be effectively used for certification purposes. In this article, the authors discuss the adoption of SFI in the context of safety certification, present a tool for the injection of realistic software faults, and show the usage of that tool in evaluating and improving the robustness of an operating system used in the avionic domain.

Cited By

View all
  • (2024)A Failure Model Library for Simulation-Based Validation of Functional SafetyComputer Safety, Reliability, and Security10.1007/978-3-031-68606-1_2(18-32)Online publication date: 17-Sep-2024
  • (2021)Integration of COTS Processing Architectures in Small Satellites for Onboard Computing Using Fault Injection Testing MethodologySoftware Engineering and Formal Methods. SEFM 2021 Collocated Workshops10.1007/978-3-031-12429-7_24(333-347)Online publication date: 6-Dec-2021
  • (2020)Validity frame concept as effort-cutting technique within the verification and validation of complex cyber-physical systemsProceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings10.1145/3417990.3419226(1-10)Online publication date: 16-Oct-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 11, Issue 4
July 2013
92 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 July 2013

Author Tags

  1. Certification
  2. Fault tolerance
  3. SAFE tool
  4. SW-FMEA
  5. Safety
  6. Security
  7. Software reliability
  8. Software safety
  9. fault injection
  10. safety certification
  11. safety-critical systems
  12. software RAMS
  13. software dependability assessment
  14. software fault tolerance
  15. software faults

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Failure Model Library for Simulation-Based Validation of Functional SafetyComputer Safety, Reliability, and Security10.1007/978-3-031-68606-1_2(18-32)Online publication date: 17-Sep-2024
  • (2021)Integration of COTS Processing Architectures in Small Satellites for Onboard Computing Using Fault Injection Testing MethodologySoftware Engineering and Formal Methods. SEFM 2021 Collocated Workshops10.1007/978-3-031-12429-7_24(333-347)Online publication date: 6-Dec-2021
  • (2020)Validity frame concept as effort-cutting technique within the verification and validation of complex cyber-physical systemsProceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings10.1145/3417990.3419226(1-10)Online publication date: 16-Oct-2020
  • (2019)Test-driven scenario specification of automotive software componentsProceedings of the 22nd International Conference on Model Driven Engineering Languages and Systems Companion10.1109/MODELS-C.2019.00009(12-17)Online publication date: 15-Sep-2019
  • (2019)Emulating representative software vulnerabilities using field dataComputing10.1007/s00607-018-0657-y101:2(119-138)Online publication date: 1-Feb-2019
  • (2017)A HW/SW Cross-Layer Approach for Determining Application-Redundant Hardware Faults in Embedded SystemsJournal of Electronic Testing: Theory and Applications10.1007/s10836-017-5643-333:1(77-92)Online publication date: 1-Feb-2017
  • (2016)Software test quality ratingKnowledge-Based Systems10.1016/j.knosys.2016.07.022110:C(167-175)Online publication date: 15-Oct-2016
  • (2015)No PAIN, no gain?Proceedings of the 37th International Conference on Software Engineering - Volume 110.5555/2818754.2818816(494-505)Online publication date: 16-May-2015
  • (2015)Evaluation of diverse compiling for software-fault detectionProceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition10.5555/2755753.2755873(531-536)Online publication date: 9-Mar-2015
  • (2015)Systems-Theoretic Safety Assessment of Robotic Telesurgical SystemsProceedings of the 34th International Conference on Computer Safety, Reliability, and Security - Volume 933710.1007/978-3-319-24255-2_16(213-227)Online publication date: 23-Sep-2015
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media