Skip to main content

Understanding the Effects of Data Corruption on Application Behavior Based on Data Characteristics

  • Conference paper
  • First Online:
Computer Safety, Reliability, and Security (SAFECOMP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9337))

Included in the following conference series:

  • 1481 Accesses

Abstract

In this paper, the results of an experimental study on the error sensitivities of application data are presented. We develop a portable software-implemented fault-injection (SWIFI) tool that, on top of performing single-bit flip fault injections and capturing their effects on application behavior, is also data-level aware and tracks the corrupted application data to report their high-level characteristics (usage type, size, user, memory space location). After extensive testing of NPB-serial (7.8M fault injections), we are able to characterize the sensitivities of data based on their high-level characteristics. Moreover, we conclude that application data are error sensitive in parts; depending on their type, they have distinct and wide less-sensitive bit ranges either at the MSBs or LSBs. Among other uses, such insight could drive the development of sensitivity-aware protection mechanisms of application data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sorin, D.J.: Fault tolerant computer architecture. Synth. Lect. Comput. Archit. 4, 1–104 (2009)

    Article  Google Scholar 

  2. Kanawati, G., et al.: FERRARI: a flexible software-based fault and error injection system. Trans. Comput. 44(2), 248–260 (1995)

    Article  MATH  Google Scholar 

  3. Skarin, D., et al.: GOOFI-2: a tool for experimental dependability assessment. In: DSN (2010)

    Google Scholar 

  4. Stott, D., et al.: NFTAPE: a framework for assessing dependability in distributed systems with lightweight fault injectors. In: IPDS (2000)

    Google Scholar 

  5. Carreira, J., et al.: Xception: a technique for the experimental evaluation of dependability in modern computers. Trans. Softw. Eng. 24(2), 125–136 (1998)

    Article  Google Scholar 

  6. Segall, Z., et al.: FIAT-fault injection based automated testing environment. In: FTCS (1988)

    Google Scholar 

  7. Mukherjee, S.S., et al.: A systematic methodology to compute the architectural vulnerability factors for a high-performance microprocessor. In: MICRO (2003)

    Google Scholar 

  8. Ayatolahi, F., Sangchoolie, B., Johansson, R., Karlsson, J.: A study of the impact of single bit-flip and double bit-flip errors on program execution. In: Bitsch, F., Guiochet, J., Kaâniche, M. (eds.) SAFECOMP. LNCS, vol. 8153, pp. 265–276. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  9. Luk, C.K., et al.: Pin: Building customized program analysis tools with dynamic instrumentation. In: PLDI (2005)

    Google Scholar 

  10. Zhu, Y., et al.: Privacy scope: a precise information flow tracking system for finding application leaks. Technical report (2009)

    Google Scholar 

  11. Bailey, D., et al.: The NAS parallel benchmarks. Intern J. High Perform. Comput. Appl. 5(3), 63–73 (1991)

    Article  Google Scholar 

  12. Arlat, J., et al.: Comparison of physical and software-implemented fault injection techniques. Trans. Comput. 52(9), 1115–1133 (2003)

    Article  Google Scholar 

  13. Hiller, M., et al.: PROPANE: an environment for examining the propagation of errors in software. In: ISSTA (2002)

    Google Scholar 

  14. Gerardin, J.P.: The DEF-Injecto test instrument, assistance in the design of reliable and safe systems. Comput. Ind. 11(4), 311–319 (1989)

    Article  Google Scholar 

  15. Greskamp, B., et al.: BlueShift: designing processors for timing speculation from the ground up. In: HPCA (2009)

    Google Scholar 

  16. Ernst, D., et al.: Razor: a low-power pipeline based on circuit-level timing speculation. In: MICRO (2003)

    Google Scholar 

  17. Zhang, W., et al.: Performance, energy, and reliability tradeoffs in replicating hot cache lines. In: CASES (2003)

    Google Scholar 

  18. de Kruijf, M., et al.: Relax: an architectural framework for software recovery of hardware faults. In: ISCA (2010)

    Google Scholar 

  19. Reis, G.A., et al.: SWIFT: software implemented fault tolerance. In: CGO (2005)

    Google Scholar 

  20. Borodin, D., et al.: Instruction-level fault tolerance configurability. J. Sig. Process. Syst. 57(1), 89–105 (2009)

    Article  Google Scholar 

  21. Feng, S., et al.: Shoestring: probabilistic soft error reliability on the cheap. In: ASPLOS (2010)

    Google Scholar 

  22. Mehrara, M., Austin, T.: Exploiting selective placement for low-cost memory protection. TACO 5(3), 1–24 (2008)

    Article  Google Scholar 

  23. Lee, K., et al.: Partially protected caches to reduce failures due to soft errors in multimedia applications. Trans. VLSI Syst. 17(9), 1343–1347 (2009)

    Article  Google Scholar 

  24. Sampson, A., et al.: EnerJ: approximate data types for safe and general low-power computation. In: PLDI (2011)

    Google Scholar 

  25. Chang, J., et al.: Automatic instruction-level software-only recovery. In: DSN (2006)

    Google Scholar 

Download references

Acknowledgements

We thank the reviewers for their valuable comments and suggestions. This work is supported by EPSRC grant EP/M00113X/1 to the University of Edinburgh.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Georgios Stefanakis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Stefanakis, G., Nagarajan, V., Cintra, M. (2015). Understanding the Effects of Data Corruption on Application Behavior Based on Data Characteristics. In: Koornneef, F., van Gulijk, C. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science(), vol 9337. Springer, Cham. https://doi.org/10.1007/978-3-319-24255-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24255-2_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24254-5

  • Online ISBN: 978-3-319-24255-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics