Fault injection campaigns have been used extensively to characterize the behavior of systems under errors. Traditional characterization studies, however, focus only on analyzing fail-stop behavior, incorrect test results, and other obvious failures observed during the experiment. More research is needed to evaluate the impact of silent failures—a relevant and insidious class of real-world failures—and doing so in a fully automated way in a fault injection setting. This paper presents a new methodology to identify fault injection-induced silent failures and assess their impact in a fully automated way. Drawing inspiration from system call-based anomaly detection, we compare faulty and fault-free execution runs and pinpoint behavioral differe...
This thesis presents two unique sets of fault injections on mission-critical computer systems with t...
Cloud computing systems fail in complex and unexpected ways, due to unexpected combinations of event...
This paper attempts to solidify the technical issues involved in the long-standing debate about the ...
Abstract—Fault injection campaigns have been used extensively to characterize the behavior of system...
Previous work has shown that using only simple behavior based error detection mechanisms invisible t...
Software faults are recognized to be among the main responsible for system failures in many applicat...
Reproducing and learning from failures in deployed software is costly and difficult. Those activitie...
There is trend of increasing demand for highly dependable software systems. The factors that influen...
Society is becoming quite dependent on computer-based systems. Today, computers are embedded in wris...
Monitoring is a consolidated practice to characterize the dependability behavior of a software syste...
Standards for quality software are increasingly important, especially for critical systems. Developm...
The analysis of fault injection experiments can be a cumbersome task. These experiments can generate...
International audienceThe main goal of the experimental study reported in this paper is to investiga...
Analyzing the executions of a buggy program is essentially a data mining process: Tracing the data g...
<p>This thesis deals with techniques for designing and evaluating error detection and recovery mecha...
This thesis presents two unique sets of fault injections on mission-critical computer systems with t...
Cloud computing systems fail in complex and unexpected ways, due to unexpected combinations of event...
This paper attempts to solidify the technical issues involved in the long-standing debate about the ...
Abstract—Fault injection campaigns have been used extensively to characterize the behavior of system...
Previous work has shown that using only simple behavior based error detection mechanisms invisible t...
Software faults are recognized to be among the main responsible for system failures in many applicat...
Reproducing and learning from failures in deployed software is costly and difficult. Those activitie...
There is trend of increasing demand for highly dependable software systems. The factors that influen...
Society is becoming quite dependent on computer-based systems. Today, computers are embedded in wris...
Monitoring is a consolidated practice to characterize the dependability behavior of a software syste...
Standards for quality software are increasingly important, especially for critical systems. Developm...
The analysis of fault injection experiments can be a cumbersome task. These experiments can generate...
International audienceThe main goal of the experimental study reported in this paper is to investiga...
Analyzing the executions of a buggy program is essentially a data mining process: Tracing the data g...
<p>This thesis deals with techniques for designing and evaluating error detection and recovery mecha...
This thesis presents two unique sets of fault injections on mission-critical computer systems with t...
Cloud computing systems fail in complex and unexpected ways, due to unexpected combinations of event...
This paper attempts to solidify the technical issues involved in the long-standing debate about the ...