期刊文献+

基于软件故障注入的星载系统错误传播研究

Study on Error Propagation in Onboard Software System Based on Software-implemented Fault Injection
下载PDF
导出
摘要 设计了信号故障传播率的计算方法,在此基础上设计了根据信号故障传播率进行故障注入实验,并根据故障注入实验的结果绘制错误传播图的方法.根据实验结果和错误传播图可以从信号和模块两个层次对系统进行分析,找出最为脆弱的部分,即找出最可能传播故障的信号和模块,以及最可能传播故障的一条路径.据此可对系统的可靠性做出评测.工作在高辐射环境下的各类软件系统,如星载系统,在运行过程中可能会因环境的扰动发生SEU现象,本文利用软件故障注入技术对这种现象进行模拟,进行故障注入实验,实验结果表明我们设计的算法能有效地对系统的可靠性做出评测. In this paper a computing model and an injecting algorithm are introduced.Based on this injecting algorithm a drawing algorithm of error propagation graphic is put forward.Some reliability indices are introduced such as error propagating rate and error exposure rate.Using these indices the error propagation rules are studied and the signals and modules that are more vulnerable than others when facing environmental disturbances can be found.So the error detecting and correcting mechanisms can be deployed on those more vulnerable signals and modules.Through a fault injection experiment all indices are computed.The most vulnerable signals and modules are found and the most vulnerable error propagating path is also determined.At the same time the experiment process proves the effectiveness and validity of algorithm.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第7期1477-1480,共4页 Journal of Chinese Computer Systems
基金 航天科技创新基金项目(CASC0409)资助
关键词 错误传播率 SEU 暴露率 故障注入 error propagation rate SEU error exposure rate fault injection
  • 相关文献

参考文献13

  • 1Goloubeva O, Rebaudengo M, Reorda M S, et al. Soft-error de- tection using control flow assertions [ C]. Procceding of the 18th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, Los Alamitos, 2003.
  • 2Cheynet P, Nicolescu B, Velazco R, et al. Experimentally evalua- ting an automatic approach for generating safety-critical software with respect tO transient errors [ J ]. 1EEE Trans. on Nuclear Sci- ence, 2000, 47(6) :2231-2236.
  • 3Ziegler J F. IBM experiments in soft fails in computer electronics ( 1978-1994 ) [ J ]. IBM Journal of Research and Development, 1996, 40( 1 ) :3-18.
  • 4Mahmood A, McCluskey E J. Concurrent error detection using watchdog processors-a survey [ J ]. IEEE Transactions on Comput- ers, 1988,37 (2) : 160-174.
  • 5Oh N, Shirvani P P, McCluskey E J. Control flow checking by software signatures[ J]. IEEE Trans. Reliability, 2002, 51 ( 1 ) : 111-122.
  • 6Huang J C. Detection of data flow anomaly through program instru- mentation[ J]. IEEE Trans. on Software Engineering, 1979,3 (5) :226-236.
  • 7Oh Nahmsuk, Mitra Subhasish, McCluskcy Edward J. ED4I: error detection by diverse data and duplicated instructions [ J ]. IEEE Transactions on Computers, 2002, 51 (2) : 180-199.
  • 8Avizienis A. The N-version approach to fault-tolerant software [ J ]. IEEE Transactions on Software Engineedng, 1985,11 (12) :1491- 1501.
  • 9陈锦富,卢炎生,谢晓东.软件错误注入测试技术研究[J].软件学报,2009,20(6):1425-1443. 被引量:27
  • 10Martin Hiller. A software profiling methodology for design and as- sessment of dependable software[ D]. Sweden: Chalmers Univer- sity of Technology, 2002.

二级参考文献2

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部