Skip to main content

An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models

  • Conference paper
  • First Online:
Computer Safety, Reliability and Security (SAFECOMP 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2187))

Included in the following conference series:

  • 625 Accesses

Abstract

This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool to support the dependability analysis of computer systems early in the design process. The proposed framework combines functional and behavioral modeling, fault injection and simulation. Starting from the RDD-100 model built by the system designers, two techniques are discussed for the mutation of this model to analyze its behavior under faulty conditions: a) insertion of saboteurs into the model, and b) modification of existing component descriptions. Four types of fault models are distinguished and specific mechanisms to simulate the corresponding fault models are proposed for each mutation technique. An approach combining the advantages of both techniques is proposed and a prototype implementing this approach is briefly described.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Ayache, P. Humbert, E. Conquet et al., “Formal Methods for the Validation of Fault Tolerance in Autonomous Spacecraft”, 26th Int. Symp. on Fault-Tolerant Computing (FTCS-26), (Sendai, Japan), pp. 353–357, IEEE Computer Society, 1996.

    Google Scholar 

  2. J. Boué, P. Pétillon, Y. Crouzet, “MEFISTO-L: A VHDL-based Fault Injection Tool for the Experimental Assessment of Fault Tolerance”, 28th Int. Symp. on Fault-Tolerant Computing (FTCS-28), (Munich, Germany), pp. 168–173, IEEE Computer Society, 1998.

    Google Scholar 

  3. J. A. Clark, D. K. Pradhan, “REACT: A Synthesis and Evaluation Tool for Fault-Tolerant Microprocessor Architectures”, Annual Reliability & Maintainability Symp., pp. 428–435, IEEE Computer Society, 1993.

    Google Scholar 

  4. R. A. De Millo, R. J. Lipton, F. G. Sayward, “Hints on Test Data Selection: Help for the Practicing Programmer”, IEEE Computer Magazine, vol. 11, pp. 34–41, 1978.

    Google Scholar 

  5. A. Ghosh, B. W. Johnson, J. A. Profeta III, “System-Level Modeling in the ADEPT Environment of a Distributed Computer System for Real-Time Applications”, 1 st International Computer Performance and Dependability Symposium (IPDS’95), (Erlangen, Germany), pp. 194–203, IEEE Computer Society, 1995.

    Google Scholar 

  6. K. K. Goswami, R. K. Iyer, L. Young, “DEPEND: A Simulation-Based Environment for System Level Dependability Analysis”, IEEE Transactions on Computers, vol. 46, pp. 60–74, 1997.

    Article  Google Scholar 

  7. D. Harel, H. Lachover, A. Naamad et al., “STATEMATE: A Working Environment for the Development of Complex Reactive Systems”, IEEE Transactions on Software Engineering, vol. 16, pp. 403–414, 1990.

    Article  Google Scholar 

  8. E. Jenn, J. Arlat, M. Rimén et al., “Fault Injection into VHDL Models: The MEFISTO Tool”, 24th Int. Symp. on Fault-Tolerant Computing (FTCS-24), (Austin, TX, USA), pp. 66–75, IEEE Computer Society, 1994.

    Google Scholar 

  9. M. Kaêniche, L. Romano, Z. Kalbarczyk et al., “A Hierarchical Approach for Dependability Analysis of a Commercial Cache-based RAID Storage Architecture”, 28 th Int. Symp. on Fault-Tolerant Computing (FTCS-28), (Munich, Germany), pp. 6–15, 1998.

    Google Scholar 

  10. Y. Le Guédart, “Functional and Faulty Behavior Analysis with RDD-100 — Method and Prototype”, LAAS Report N∘ 00561, 2000 (in French).

    Google Scholar 

  11. Y. Le Guédart, L. Marneffe, F. Scheerens et al., “Functional and Faulty Behavior Analysis: Some Experiments and Lessons Learnt”, 29th Int. Symp. on Fault-Tolerant Computing (FTCS-29), (Madison, USA), pp. 348–351, 1999.

    Google Scholar 

  12. P. Thévenod-Fosse, H. Waeselynck, Y. Crouzet, “Statistical Software Testing”, in Predictably Dependable Computing Systems, J.-C. Laprie, B. Randell, H. Kopetz, B. Littlewood, Ed. Berlin: Springer-Verlag, 1995, pp. 253–272.

    Google Scholar 

  13. J. M. Voas, G. McGraw, Software Fault Injection — Inoculating Programs Against Errors: John Wiley & Sons, Inc., 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kaâniche, M., Le Guédart, Y., Arlat, J., Boyer, T. (2001). An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models. In: Voges, U. (eds) Computer Safety, Reliability and Security. SAFECOMP 2001. Lecture Notes in Computer Science, vol 2187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45416-0_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-45416-0_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42607-3

  • Online ISBN: 978-3-540-45416-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics