Abstract
This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool to support the dependability analysis of computer systems early in the design process. The proposed framework combines functional and behavioral modeling, fault injection and simulation. Starting from the RDD-100 model built by the system designers, two techniques are discussed for the mutation of this model to analyze its behavior under faulty conditions: a) insertion of saboteurs into the model, and b) modification of existing component descriptions. Four types of fault models are distinguished and specific mechanisms to simulate the corresponding fault models are proposed for each mutation technique. An approach combining the advantages of both techniques is proposed and a prototype implementing this approach is briefly described.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. Ayache, P. Humbert, E. Conquet et al., “Formal Methods for the Validation of Fault Tolerance in Autonomous Spacecraft”, 26th Int. Symp. on Fault-Tolerant Computing (FTCS-26), (Sendai, Japan), pp. 353–357, IEEE Computer Society, 1996.
J. Boué, P. Pétillon, Y. Crouzet, “MEFISTO-L: A VHDL-based Fault Injection Tool for the Experimental Assessment of Fault Tolerance”, 28th Int. Symp. on Fault-Tolerant Computing (FTCS-28), (Munich, Germany), pp. 168–173, IEEE Computer Society, 1998.
J. A. Clark, D. K. Pradhan, “REACT: A Synthesis and Evaluation Tool for Fault-Tolerant Microprocessor Architectures”, Annual Reliability & Maintainability Symp., pp. 428–435, IEEE Computer Society, 1993.
R. A. De Millo, R. J. Lipton, F. G. Sayward, “Hints on Test Data Selection: Help for the Practicing Programmer”, IEEE Computer Magazine, vol. 11, pp. 34–41, 1978.
A. Ghosh, B. W. Johnson, J. A. Profeta III, “System-Level Modeling in the ADEPT Environment of a Distributed Computer System for Real-Time Applications”, 1 st International Computer Performance and Dependability Symposium (IPDS’95), (Erlangen, Germany), pp. 194–203, IEEE Computer Society, 1995.
K. K. Goswami, R. K. Iyer, L. Young, “DEPEND: A Simulation-Based Environment for System Level Dependability Analysis”, IEEE Transactions on Computers, vol. 46, pp. 60–74, 1997.
D. Harel, H. Lachover, A. Naamad et al., “STATEMATE: A Working Environment for the Development of Complex Reactive Systems”, IEEE Transactions on Software Engineering, vol. 16, pp. 403–414, 1990.
E. Jenn, J. Arlat, M. Rimén et al., “Fault Injection into VHDL Models: The MEFISTO Tool”, 24th Int. Symp. on Fault-Tolerant Computing (FTCS-24), (Austin, TX, USA), pp. 66–75, IEEE Computer Society, 1994.
M. Kaêniche, L. Romano, Z. Kalbarczyk et al., “A Hierarchical Approach for Dependability Analysis of a Commercial Cache-based RAID Storage Architecture”, 28 th Int. Symp. on Fault-Tolerant Computing (FTCS-28), (Munich, Germany), pp. 6–15, 1998.
Y. Le Guédart, “Functional and Faulty Behavior Analysis with RDD-100 — Method and Prototype”, LAAS Report N∘ 00561, 2000 (in French).
Y. Le Guédart, L. Marneffe, F. Scheerens et al., “Functional and Faulty Behavior Analysis: Some Experiments and Lessons Learnt”, 29th Int. Symp. on Fault-Tolerant Computing (FTCS-29), (Madison, USA), pp. 348–351, 1999.
P. Thévenod-Fosse, H. Waeselynck, Y. Crouzet, “Statistical Software Testing”, in Predictably Dependable Computing Systems, J.-C. Laprie, B. Randell, H. Kopetz, B. Littlewood, Ed. Berlin: Springer-Verlag, 1995, pp. 253–272.
J. M. Voas, G. McGraw, Software Fault Injection — Inoculating Programs Against Errors: John Wiley & Sons, Inc., 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kaâniche, M., Le Guédart, Y., Arlat, J., Boyer, T. (2001). An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models. In: Voges, U. (eds) Computer Safety, Reliability and Security. SAFECOMP 2001. Lecture Notes in Computer Science, vol 2187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45416-0_14
Download citation
DOI: https://doi.org/10.1007/3-540-45416-0_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42607-3
Online ISBN: 978-3-540-45416-8
eBook Packages: Springer Book Archive