Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

EPIC: Profiling the Propagation and Effect of Data Errors in Software

Published: 01 May 2004 Publication History

Abstract

We present an approach for analyzing the propagation and effect of data errors in modular software enabling the profiling of the vulnerabilities of software to find 1) the modules and signals most likely exposed to propagating errors and 2) the modules and signals which, when subjected to error, tend to cause more damage than others from a systems operation point-of-view. We discuss how to use the obtained profiles to identify where dependability structures and mechanisms will likely be the most effective, i.e., how to perform a cost-benefit analysis for dependability. A fault-injection-based method for estimation of the various measures is described and the software of a real embedded control system is profiled to show the type of results obtainable by the analysis framework.

References

[1]
J. Arlat M. Aguera L. Amat Y. Crouzet J.-C. Fabre J.-C. Laprie E. Martins and D. Powell, “Fault Injection for Dependability Validation: A Methodology and Some Applications,” IEEE Trans. Software Eng., vol. 16, no. 2, pp. 166-182, 1990.
[2]
R. Chillarege and N.S. Bowen, “Understanding Large System Failures-A Fault Injection Experiment,” Proc. Int'l Symp. Fault-Tolerant Computing (FTCS-19), pp. 356-363, 1989.
[3]
J. Christmansson M. Hiller and M. Rimén, “An Experimental Comparison of Fault and Error Injection,” Proc. Int'l Symp. Software Reliability Eng. (ISSRE '98), pp. 369-378, 1998.
[4]
Gy. Csertán A. Pataricza and E. Selenyi, “Dependability Analysis in HW-SW Codesign,” Proc. Int'l Computer Performance and Dependability Symp. (IPDS '95), pp. 306-315, 1995.
[5]
M. Cukier D. Powell and J. Arlat, “Coverage Estimation Methods for Stratified Fault-Injection,” IEEE Trans. Computers, vol. 48, no. 7, pp. 707-723, July 1999.
[6]
J.-C. Fabre F. Salles M. Rodriguez-Moreno and J. Arlat, “Assessment of COTS Microkernels by Fault Injection,” Proc. Conf. Dependable Computing for Critical Applications (DCCA-7), pp. 25-44, 1999.
[7]
H. Fujiwara and T. Shimono, “On the Acceleration of Test Generation Algorithms,” Proc. Int'l Symp. Fault-Tolerant Computing (FTCS-13), pp. 98-105, 1983.
[8]
S.J. Geoghegan and D. Avresky, “Method for Designing and Placing Check Sets Based on Control Flow Analysis of Programs,” Proc. Int'l Symp. Software Reliability Eng. (ISSRE '96), pp. 256-265, 1996.
[9]
P. Goel, “An Implicit Enumeration Algorithm to Generate Tests for Combinational Logic Circuits,” IEEE Trans. Computers, vol. 30, no. 3, pp. 215-222, Mar. 1981.
[10]
J. Güthoff and V. Sieh, “Combining Software-Implemented and Simulation-Based Fault Injection into a Single Fault Injection Method,” Proc. Int'l Symp. Fault-Tolerant Computing (FTCS-25), pp. 196-206, 1995.
[11]
M. Hiller, “Executable Assertions for Detecting Data Errors in Embedded Control Systems,” Proc. Int'l Conf. Dependable Systems and Networks (DSN 2000), pp. 24-33, 2000.
[12]
M. Hiller A. Jhumka and N. Suri, “An Approach for Analysing the Propagation of Data Errors in Software,” Proc. Int'l Conf. Dependable Systems and Networks (DSN 2001), pp. 161-170, 2001.
[13]
M. Hiller A. Jhumka and N. Suri, “On the Placement of Software Mechanisms for Detection of Data Errors,” Proc. Int'l Conf. Dependable Systems and Networks (DSN 2002), pp. 135-144, 2002.
[14]
M. Hiller A. Jhumka and N. Suri, “PROPANE: An Environment for Examining the Propagation of Errors in Software,” Proc. Int'l Symp. Software Testing and Analysis (ISSTA '02), pp. 81-85, 2002.
[15]
R.K. Iyer and D. Tang, “Experimental Analysis of Computer System Dependability,” Fault-Tolerant Computer System Design, D.K. Pradhan, ed, chapter 5, Prentice Hall, 1996.
[16]
J. Karlsson P. Folkesson J. Arlat Y. Crouzet G. Leber and J. Reisinger, “Application of Three Physical Fault Injection Techniques to the Experimental Assessment of the MARS Architecture,” Proc. Dependable Computing for Critical Applications (DCCA-5), pp. 267-287, 1995.
[17]
J.-C. Laprie, “Dependable Computing: Concepts, Limits, Challenges,” Proc. Int'l Symp. Fault-Tolerant Computing (FTCS-25), pp. 42-54, 1995.
[18]
N.G. Leveson S.S. Cha J.C. Knight and T.J. Shimeall, “The Use of Self Checks and Voting in Software Error Detection: An Empirical Study,” IEEE Trans. Software Eng., vol. 16, no. 4, pp. 432-443, Apr. 1990.
[19]
A. Mahmood D.M. Andrews and E.J. McCluskey, “Executable Assertions and Flight Software,” Proc. Digital Avionics Systems Conf. (DASC-6), pp. 346-351, 1984.
[20]
H. Madeira M. Vieira and D. Costa, “On The Emulation of Software Faults by Software Fault Injection,” Proc. Int'l Conf. Dependable Systems and Networks (DSN-2000), pp. 417-426, 2000.
[21]
C.C. Michael and R.C. Jones, “On the Uniformity of Error Propagation in Software,” Proc. Int'l Conf. Computer Assurance (COMPASS '97), pp. 68-76, 1997.
[22]
L. Morell B. Murrill and R. Rand, “Perturbation Analysis of Computer Programs,” Proc. Int'l Conf. Computer Assurance (COMPASS'97), pp. 77-87, 1997.
[23]
D. Powell E. Martins J. Arlat and Y. Crouzet, “Estimators for Fault Tolerance Coverage Evaluation,” IEEE Trans. Computer, vol. 44,no. 2, pp. 261-274, Feb. 1995.
[24]
C. Rabéjac J.P. Blanquart and J.P. Queille, “Executable Assertions and Timed Traces for On-Line Software Error Detection,” Proc. Int'l Symp. Fault-Tolerant Computing (FTCS-26), pp. 138-147, 1996.
[25]
M. Rimén J. Ohlsson and J. Torin, “On Microprocessor Error Behavior Modeling,” Proc. Int'l Symp. Fault-Tolerant Computing (FTCS-24), pp. 76-85, 1994.
[26]
J.P. Roth, Computer Logic, Testing and Verification. Computer Press, 1980.
[27]
S.H. Saib, “Executable Assertions-An Aid To Reliable Software,” Proc. 11th Asilomar Conf. Circuits, Systems, and Computers, pp. 277-281, 1978.
[28]
F. Salles M.R. Moreno J.C. Fabre and J. Arlat, “MetaKernels and Fault Containment Wrappers,” Proc. Int'l Symp. Fault-Tolerant Computing (FTCS-29), pp. 22-29, 1999.
[29]
K.G. Shin and T.-H. Lin, “Modeling and Measurement of Error Propagation in a Multimodule Computing System,” IEEE Trans. Computers, vol. 37, no. 9, pp. 1053-1066, Sept. 1988.
[30]
D.T. Smith B.W. Johnson and J.A. Profeta III, “System Dependability Evaluation via a Fault List Generation Algorithm,” IEEE Trans. Computers, vol. 45, no. 8, pp. 974-979, Aug. 1996.
[31]
A. Steininger and C. Scherrer, “On Finding an Optimal Combination of Error Detection Mechanisms Based on Results of Fault Injection Experiments,” Proc. Int'l Symp. Fault-Tolerant Computing (FTCS-27), pp. 238-247, 1997.
[32]
US Air Force - 99, “MIL-SPEC: Aircraft Arresting System BAK-12A/E32A; Portable, Rotary Friction,” MIL-A-38202C, Notice 1, US Dept. of Defense, Sept. 1986.
[33]
J. Voas and L.J. Morell, “Propagation and Infection Analysis (PIA) Applied to Debugging,” Proc. Southeastcon '90 Conf., pp. 379-383, 1990.
[34]
J. Voas, “PIE: A Dynamic Failure-Based Technique,” IEEE Trans. Software Eng., vol. 18, no. 8, pp. 717-727, Aug. 1992.
[35]
J. Voas F. Charron and L. Beltracchi, “Error Propagation Analysis Studies in a Nuclear Research Code,” Proc. Aerospace Conf., vol. 4, pp. 115-121, 1998.

Cited By

View all
  • (2018)Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPSACM Transactions on Cyber-Physical Systems10.1145/32260293:1(1-25)Online publication date: 5-Sep-2018
  • (2015)Database-backed program analysis for scalable error propagationProceedings of the 37th International Conference on Software Engineering - Volume 110.5555/2818754.2818827(586-597)Online publication date: 16-May-2015
  • (2015)Reliability prediction for component-based software systemsScience of Computer Programming10.1016/j.scico.2014.03.01697:P4(426-457)Online publication date: 1-Jan-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Computers
IEEE Transactions on Computers  Volume 53, Issue 5
May 2004
144 pages

Publisher

IEEE Computer Society

United States

Publication History

Published: 01 May 2004

Author Tags

  1. Data error propagation
  2. data error effect
  3. dependability assessment.
  4. fault injection
  5. software profiling

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPSACM Transactions on Cyber-Physical Systems10.1145/32260293:1(1-25)Online publication date: 5-Sep-2018
  • (2015)Database-backed program analysis for scalable error propagationProceedings of the 37th International Conference on Software Engineering - Volume 110.5555/2818754.2818827(586-597)Online publication date: 16-May-2015
  • (2015)Reliability prediction for component-based software systemsScience of Computer Programming10.1016/j.scico.2014.03.01697:P4(426-457)Online publication date: 1-Jan-2015
  • (2014)An empirical study of injected versus actual interface errorsProceedings of the 2014 International Symposium on Software Testing and Analysis10.1145/2610384.2610418(397-408)Online publication date: 21-Jul-2014
  • (2011)A compositional method for reliability analysis of workflows affected by multiple failure modesProceedings of the 14th international ACM Sigsoft symposium on Component based software engineering10.1145/2000229.2000251(149-158)Online publication date: 20-Jun-2011
  • (2010)Reliability analysis of component-based systems with multiple failure modesProceedings of the 13th international conference on Component-Based Software Engineering10.1007/978-3-642-13238-4_1(1-20)Online publication date: 23-Jun-2010
  • (2009)Error propagation analysis for file systemsACM SIGPLAN Notices10.1145/1543135.154250644:6(270-280)Online publication date: 15-Jun-2009
  • (2009)Error propagation analysis for file systemsProceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation10.1145/1542476.1542506(270-280)Online publication date: 15-Jun-2009
  • (2009)Type Inference for Soft-Error Fault-Tolerance PredictionProceedings of the 24th IEEE/ACM International Conference on Automated Software Engineering10.1109/ASE.2009.61(65-75)Online publication date: 16-Nov-2009
  • (2007)Error propagation monitoring on windows mobile-based devicesProceedings of the Third Latin-American conference on Dependable Computing10.5555/2396065.2396078(111-122)Online publication date: 26-Sep-2007
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media