Critical systems that integrate software components (e.g., from third-parties) need to address the risk of residual software defects in these components. Software fault injection is an experimental solution to gauge such risk. Many error models have been proposed for emulating faulty components, such as by injecting error codes and exceptions, or by corrupting data with bit-flips, boundary values, and random values. Even if these error models have been able to find breaches in fragile systems, it is unclear whether these errors are in fact representative of software faults. To pursue this open question, we propose a methodology to analyze how software faults in C/C++ software components turn into errors at components' interfaces (interface ...
In Computer Science, an emulator is hardware or software or both that duplicates (or emulates) the f...
This paper describes software fault injection and what types of anomalies fault injection should sim...
The complexity of safety-related embedded computer systems is steadilyincreasing. Besides verifying ...
Critical systems that integrate software components (e.g., from third-parties) need to address the r...
The reuse of software components is a common practice in commercial applications and increasingly ap...
The reuse of software components is a common practice in commercial applications and increasingly ap...
Society is becoming quite dependent on computer-based systems. Today, computers are embedded in wris...
The injection of interface faults through API parameter corruption is a technique commonly used in e...
Abstract—The injection of software faults (i.e., bugs) by mutating the binary executable code of a p...
c © Copyright by Roberto Natella, 2011 Given the complexity of modern software systems and its perva...
Constructing a dependable and fault-tolerant system is inherently difficult. Not only should the sys...
The injection of software faults (i.e., bugs) by mutating the binary executable code of a program en...
Hardware errors are projected to increase in modern computer systems due to shrinking feature sizes ...
Transient hardware faults caused by cosmic ray or alpha particle strikes in hardware components are ...
Abstract: It is the sad truth that no matter how good a programmer you are all software systems will...
In Computer Science, an emulator is hardware or software or both that duplicates (or emulates) the f...
This paper describes software fault injection and what types of anomalies fault injection should sim...
The complexity of safety-related embedded computer systems is steadilyincreasing. Besides verifying ...
Critical systems that integrate software components (e.g., from third-parties) need to address the r...
The reuse of software components is a common practice in commercial applications and increasingly ap...
The reuse of software components is a common practice in commercial applications and increasingly ap...
Society is becoming quite dependent on computer-based systems. Today, computers are embedded in wris...
The injection of interface faults through API parameter corruption is a technique commonly used in e...
Abstract—The injection of software faults (i.e., bugs) by mutating the binary executable code of a p...
c © Copyright by Roberto Natella, 2011 Given the complexity of modern software systems and its perva...
Constructing a dependable and fault-tolerant system is inherently difficult. Not only should the sys...
The injection of software faults (i.e., bugs) by mutating the binary executable code of a program en...
Hardware errors are projected to increase in modern computer systems due to shrinking feature sizes ...
Transient hardware faults caused by cosmic ray or alpha particle strikes in hardware components are ...
Abstract: It is the sad truth that no matter how good a programmer you are all software systems will...
In Computer Science, an emulator is hardware or software or both that duplicates (or emulates) the f...
This paper describes software fault injection and what types of anomalies fault injection should sim...
The complexity of safety-related embedded computer systems is steadilyincreasing. Besides verifying ...