Critical systems that integrate software components (e.g., from third-parties) need to address the risk of residual software defects in these components. Software fault injection is an experimental solution to gauge such risk. Many error models have been proposed for emulating faulty components, such as by injecting error codes and exceptions, or by corrupting data with bit-flips, boundary values, and random values. Even if these error models have been able to find breaches in fragile systems, it is unclear whether these errors are in fact representative of software faults. To pursue this open question, we propose a methodology to analyze how software faults in $C/C_{++}$ software components turn into errors at components' interfaces (inter...
Abstract: It is the sad truth that no matter how good a programmer you are all software systems will...
In Computer Science, an emulator is hardware or software or both that duplicates (or emulates) the f...
The complexity of safety-related embedded computer systems is steadilyincreasing. Besides verifying ...
Critical systems that integrate software components (e.g., from third-parties) need to address the r...
The reuse of software components is a common practice in commercial applications and increasingly ap...
The reuse of software components is a common practice in commercial applications and increasingly ap...
Society is becoming quite dependent on computer-based systems. Today, computers are embedded in wris...
Hardware errors are projected to increase in modern computer systems due to shrinking feature sizes ...
The injection of interface faults through API parameter corruption is a technique commonly used in e...
c © Copyright by Roberto Natella, 2011 Given the complexity of modern software systems and its perva...
Abstract—The injection of software faults (i.e., bugs) by mutating the binary executable code of a p...
The injection of software faults (i.e., bugs) by mutating the binary executable code of a program en...
This paper describes software fault injection and what types of anomalies fault injection should sim...
Transient hardware faults caused by cosmic ray or alpha particle strikes in hardware components are ...
Project (M.S., Computer Science) -- California State University, Sacramento, 2013.Software testing i...
Abstract: It is the sad truth that no matter how good a programmer you are all software systems will...
In Computer Science, an emulator is hardware or software or both that duplicates (or emulates) the f...
The complexity of safety-related embedded computer systems is steadilyincreasing. Besides verifying ...
Critical systems that integrate software components (e.g., from third-parties) need to address the r...
The reuse of software components is a common practice in commercial applications and increasingly ap...
The reuse of software components is a common practice in commercial applications and increasingly ap...
Society is becoming quite dependent on computer-based systems. Today, computers are embedded in wris...
Hardware errors are projected to increase in modern computer systems due to shrinking feature sizes ...
The injection of interface faults through API parameter corruption is a technique commonly used in e...
c © Copyright by Roberto Natella, 2011 Given the complexity of modern software systems and its perva...
Abstract—The injection of software faults (i.e., bugs) by mutating the binary executable code of a p...
The injection of software faults (i.e., bugs) by mutating the binary executable code of a program en...
This paper describes software fault injection and what types of anomalies fault injection should sim...
Transient hardware faults caused by cosmic ray or alpha particle strikes in hardware components are ...
Project (M.S., Computer Science) -- California State University, Sacramento, 2013.Software testing i...
Abstract: It is the sad truth that no matter how good a programmer you are all software systems will...
In Computer Science, an emulator is hardware or software or both that duplicates (or emulates) the f...
The complexity of safety-related embedded computer systems is steadilyincreasing. Besides verifying ...